svn commit: r382184 - head/security/vuxml
Ryan Steinmetz
zi at FreeBSD.org
Tue Mar 24 22:15:49 UTC 2015
Author: zi
Date: Tue Mar 24 22:15:48 2015
New Revision: 382184
URL: https://svnweb.freebsd.org/changeset/ports/382184
QAT: https://qat.redports.org/buildarchive/r382184/
Log:
- Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764
- Fix blockquote style to match rest
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Mar 24 21:55:15 2015 (r382183)
+++ head/security/vuxml/vuln.xml Tue Mar 24 22:15:48 2015 (r382184)
@@ -61,11 +61,11 @@ Notes:
<topic>GNU binutils -- multiple vulnerabilities</topic>
<affects>
<package>
- <name>devel/cross-binutils</name>
+ <name>cross-binutils</name>
<range><lt>2.25</lt></range>
</package>
<package>
- <name>devel/mingw64-binutils</name>
+ <name>mingw64-binutils</name>
<range><lt>2.25</lt></range>
</package>
</affects>
@@ -74,29 +74,32 @@ Notes:
<p>US-CERT/NIST reports:</p>
<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501">
<p>The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU
- binutils 2.24 and earlier allows remote attackers to cause a
- denial of service (out-of-bounds write) and possibly have other
- unspecified impact via a crafted NumberOfRvaAndSizes field in the
- AOUT header in a PE executable.</p>
+ binutils 2.24 and earlier allows remote attackers to cause a
+ denial of service (out-of-bounds write) and possibly have other
+ unspecified impact via a crafted NumberOfRvaAndSizes field in the
+ AOUT header in a PE executable.</p>
</blockquote>
<p>US-CERT/NIST reports:</p>
<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502">
<p>Heap-based buffer overflow in the pe_print_edata function in
- bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
- attackers to cause a denial of service (crash) and possibly have
- other unspecified impact via a truncated export table in a PE
- file.</p>
+ bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
+ attackers to cause a denial of service (crash) and possibly have
+ other unspecified impact via a truncated export table in a PE
+ file.</p>
</blockquote>
<p>US-CERT/NIST reports:</p>
<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503">
<p>Stack-based buffer overflow in the ihex_scan function in
- bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
- attackers to cause a denial of service (crash) and possibly have
- other unspecified impact via a crafted ihex file.</p>
+ bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
+ attackers to cause a denial of service (crash) and possibly have
+ other unspecified impact via a crafted ihex file.</p>
</blockquote>
</body>
</description>
<references>
+ <cvename>CVE-2014-8501</cvename>
+ <cvename>CVE-2014-8502</cvename>
+ <cvename>CVE-2014-8503</cvename>
<url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501</url>
<url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502</url>
<url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503</url>
More information about the svn-ports-all
mailing list