From owner-svn-ports-all@FreeBSD.ORG Tue Mar 24 22:15:49 2015
Return-Path:
Delivered-To: svn-ports-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id B3DEC6A9;
Tue, 24 Mar 2015 22:15:49 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 978DCA1;
Tue, 24 Mar 2015 22:15:49 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t2OMFnrr034851;
Tue, 24 Mar 2015 22:15:49 GMT (envelope-from zi@FreeBSD.org)
Received: (from zi@localhost)
by svn.freebsd.org (8.14.9/8.14.9/Submit) id t2OMFnWK034850;
Tue, 24 Mar 2015 22:15:49 GMT (envelope-from zi@FreeBSD.org)
Message-Id: <201503242215.t2OMFnWK034850@svn.freebsd.org>
X-Authentication-Warning: svn.freebsd.org: zi set sender to zi@FreeBSD.org
using -f
From: Ryan Steinmetz
Date: Tue, 24 Mar 2015 22:15:49 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r382184 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-all@freebsd.org
X-Mailman-Version: 2.1.18-1
Precedence: list
List-Id: SVN commit messages for the ports tree
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 24 Mar 2015 22:15:49 -0000
Author: zi
Date: Tue Mar 24 22:15:48 2015
New Revision: 382184
URL: https://svnweb.freebsd.org/changeset/ports/382184
QAT: https://qat.redports.org/buildarchive/r382184/
Log:
- Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764
- Fix blockquote style to match rest
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Mar 24 21:55:15 2015 (r382183)
+++ head/security/vuxml/vuln.xml Tue Mar 24 22:15:48 2015 (r382184)
@@ -61,11 +61,11 @@ Notes:
GNU binutils -- multiple vulnerabilities
- devel/cross-binutils
+ cross-binutils
2.25
- devel/mingw64-binutils
+ mingw64-binutils
2.25
@@ -74,29 +74,32 @@ Notes:
US-CERT/NIST reports:
The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU
- binutils 2.24 and earlier allows remote attackers to cause a
- denial of service (out-of-bounds write) and possibly have other
- unspecified impact via a crafted NumberOfRvaAndSizes field in the
- AOUT header in a PE executable.
+ binutils 2.24 and earlier allows remote attackers to cause a
+ denial of service (out-of-bounds write) and possibly have other
+ unspecified impact via a crafted NumberOfRvaAndSizes field in the
+ AOUT header in a PE executable.
US-CERT/NIST reports:
Heap-based buffer overflow in the pe_print_edata function in
- bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
- attackers to cause a denial of service (crash) and possibly have
- other unspecified impact via a truncated export table in a PE
- file.
+ bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
+ attackers to cause a denial of service (crash) and possibly have
+ other unspecified impact via a truncated export table in a PE
+ file.
US-CERT/NIST reports:
Stack-based buffer overflow in the ihex_scan function in
- bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
- attackers to cause a denial of service (crash) and possibly have
- other unspecified impact via a crafted ihex file.
+ bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
+ attackers to cause a denial of service (crash) and possibly have
+ other unspecified impact via a crafted ihex file.