Date: Thu, 29 May 2014 09:22:29 +0000 (UTC) From: Eygene Ryabinkin <rea@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r355679 - head/security/vuxml Message-ID: <201405290922.s4T9MTJG095586@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: rea Date: Thu May 29 09:22:28 2014 New Revision: 355679 URL: http://svnweb.freebsd.org/changeset/ports/355679 QAT: https://qat.redports.org/buildarchive/r355679/ Log: VuXML: cancel Exim's CVE-2014-2957 Current port isn't built with DMARC support and has no knobs to enable it. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu May 29 09:07:21 2014 (r355678) +++ head/security/vuxml/vuln.xml Thu May 29 09:22:28 2014 (r355679) @@ -58,30 +58,7 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="f99a4686-e694-11e3-9032-000c2980a9f3"> - <topic>exim -- Remote Code Execution</topic> - <affects> - <package> - <name>exim</name> - <range><eq>4.82</eq></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The exim development team reports:</p> - <blockquote cite="https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html"> - <p>When built with DMARC support, 4.82 is vulnerable to a remote - code exeuction flaw.</p> - </blockquote> - </body> - </description> - <references> - <cvename>CVE-2014-2957</cvename> - <url>https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html</url> - </references> - <dates> - <discovery>2014-05-28</discovery> - <entry>2014-05-28</entry> - </dates> + <cancelled/> </vuln> <vuln vid="688e73a2-e514-11e3-a52a-98fc11cdc4f5">
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201405290922.s4T9MTJG095586>