Date: Sun, 9 Mar 2014 09:15:18 +0000 (UTC) From: Koop Mast <kwm@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r347558 - branches/2014Q1/security/vuxml Message-ID: <201403090915.s299FIqt058753@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kwm Date: Sun Mar 9 09:15:18 2014 New Revision: 347558 URL: http://svnweb.freebsd.org/changeset/ports/347558 QAT: https://qat.redports.org/buildarchive/r347558/ Log: MFH: r347557 Unbreak vuxml. Submitted by: battlez Approved by: portmgr (erwin@) Modified: branches/2014Q1/security/vuxml/vuln.xml Directory Properties: branches/2014Q1/ (props changed) Modified: branches/2014Q1/security/vuxml/vuln.xml ============================================================================== --- branches/2014Q1/security/vuxml/vuln.xml Sun Mar 9 08:43:48 2014 (r347557) +++ branches/2014Q1/security/vuxml/vuln.xml Sun Mar 9 09:15:18 2014 (r347558) @@ -63,7 +63,7 @@ Note: Please add new entries to the beg <body xmlns="http://www.w3.org/1999/xhtml"> <p>Mateusz Jurczyk reports:</p> <blockquote cite="http://savannah.nongnu.org/bugs/?41697"> - <p>Out of bounds stack-based read/write in cf2_hintmap_build.<br> + <p>Out of bounds stack-based read/write in cf2_hintmap_build. This is a critical vulnerability in the CFF Rasterizer code recently contributed by Adobe, leading to potential arbitrary code execution in the context of the FreeType2 library client.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403090915.s299FIqt058753>