Date: Tue, 24 Mar 2015 22:15:49 +0000 (UTC) From: Ryan Steinmetz <zi@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r382184 - head/security/vuxml Message-ID: <201503242215.t2OMFnWK034850@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: zi Date: Tue Mar 24 22:15:48 2015 New Revision: 382184 URL: https://svnweb.freebsd.org/changeset/ports/382184 QAT: https://qat.redports.org/buildarchive/r382184/ Log: - Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764 - Fix blockquote style to match rest Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Mar 24 21:55:15 2015 (r382183) +++ head/security/vuxml/vuln.xml Tue Mar 24 22:15:48 2015 (r382184) @@ -61,11 +61,11 @@ Notes: <topic>GNU binutils -- multiple vulnerabilities</topic> <affects> <package> - <name>devel/cross-binutils</name> + <name>cross-binutils</name> <range><lt>2.25</lt></range> </package> <package> - <name>devel/mingw64-binutils</name> + <name>mingw64-binutils</name> <range><lt>2.25</lt></range> </package> </affects> @@ -74,29 +74,32 @@ Notes: <p>US-CERT/NIST reports:</p> <blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501"> <p>The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU - binutils 2.24 and earlier allows remote attackers to cause a - denial of service (out-of-bounds write) and possibly have other - unspecified impact via a crafted NumberOfRvaAndSizes field in the - AOUT header in a PE executable.</p> + binutils 2.24 and earlier allows remote attackers to cause a + denial of service (out-of-bounds write) and possibly have other + unspecified impact via a crafted NumberOfRvaAndSizes field in the + AOUT header in a PE executable.</p> </blockquote> <p>US-CERT/NIST reports:</p> <blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502"> <p>Heap-based buffer overflow in the pe_print_edata function in - bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote - attackers to cause a denial of service (crash) and possibly have - other unspecified impact via a truncated export table in a PE - file.</p> + bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote + attackers to cause a denial of service (crash) and possibly have + other unspecified impact via a truncated export table in a PE + file.</p> </blockquote> <p>US-CERT/NIST reports:</p> <blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503"> <p>Stack-based buffer overflow in the ihex_scan function in - bfd/ihex.c in GNU binutils 2.24 and earlier allows remote - attackers to cause a denial of service (crash) and possibly have - other unspecified impact via a crafted ihex file.</p> + bfd/ihex.c in GNU binutils 2.24 and earlier allows remote + attackers to cause a denial of service (crash) and possibly have + other unspecified impact via a crafted ihex file.</p> </blockquote> </body> </description> <references> + <cvename>CVE-2014-8501</cvename> + <cvename>CVE-2014-8502</cvename> + <cvename>CVE-2014-8503</cvename> <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501</url> <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502</url> <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503</url>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201503242215.t2OMFnWK034850>