Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Sep 2014 16:22:07 +0000 (UTC)
From:      Bryan Drewery <bdrewery@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r369269 - head/security/vuxml
Message-ID:  <201409251622.s8PGM7KI060966@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: bdrewery
Date: Thu Sep 25 16:22:06 2014
New Revision: 369269
URL: http://svnweb.freebsd.org/changeset/ports/369269
QAT: https://qat.redports.org/buildarchive/r369269/

Log:
  The 2nd bash issue was reassigned to CVE-2014-7169:
    http://seclists.org/oss-sec/2014/q3/685
  
  Reported by:	jkim

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Sep 25 16:19:34 2014	(r369268)
+++ head/security/vuxml/vuln.xml	Thu Sep 25 16:22:06 2014	(r369269)
@@ -224,12 +224,12 @@ Notes:
 	    definitions.</p>
 	</blockquote>
 	<p>The original fix released for CVE-2014-6271 was not adequate. A
-	  similar vulnerability was discovered and tagged as CVE-2014-3659.</p>
+	  similar vulnerability was discovered and tagged as CVE-2014-7169.</p>
       </body>
     </description>
     <references>
       <cvename>CVE-2014-6271</cvename>
-      <cvename>CVE-2014-3659</cvename>
+      <cvename>CVE-2014-7169</cvename>
       <url>https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/</url>;
       <url>https://lists.gnu.org/archive/html/bug-bash/2014-09/msg00081.html</url>;
       <url>http://seclists.org/oss-sec/2014/q3/690</url>;



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201409251622.s8PGM7KI060966>