Date: Thu, 25 Sep 2014 16:22:07 +0000 (UTC) From: Bryan Drewery <bdrewery@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r369269 - head/security/vuxml Message-ID: <201409251622.s8PGM7KI060966@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: bdrewery Date: Thu Sep 25 16:22:06 2014 New Revision: 369269 URL: http://svnweb.freebsd.org/changeset/ports/369269 QAT: https://qat.redports.org/buildarchive/r369269/ Log: The 2nd bash issue was reassigned to CVE-2014-7169: http://seclists.org/oss-sec/2014/q3/685 Reported by: jkim Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Sep 25 16:19:34 2014 (r369268) +++ head/security/vuxml/vuln.xml Thu Sep 25 16:22:06 2014 (r369269) @@ -224,12 +224,12 @@ Notes: definitions.</p> </blockquote> <p>The original fix released for CVE-2014-6271 was not adequate. A - similar vulnerability was discovered and tagged as CVE-2014-3659.</p> + similar vulnerability was discovered and tagged as CVE-2014-7169.</p> </body> </description> <references> <cvename>CVE-2014-6271</cvename> - <cvename>CVE-2014-3659</cvename> + <cvename>CVE-2014-7169</cvename> <url>https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/</url> <url>https://lists.gnu.org/archive/html/bug-bash/2014-09/msg00081.html</url> <url>http://seclists.org/oss-sec/2014/q3/690</url>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201409251622.s8PGM7KI060966>