svn commit: r355679 - head/security/vuxml
Eygene Ryabinkin
rea at FreeBSD.org
Thu May 29 09:22:29 UTC 2014
Author: rea
Date: Thu May 29 09:22:28 2014
New Revision: 355679
URL: http://svnweb.freebsd.org/changeset/ports/355679
QAT: https://qat.redports.org/buildarchive/r355679/
Log:
VuXML: cancel Exim's CVE-2014-2957
Current port isn't built with DMARC support and has no knobs to enable it.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu May 29 09:07:21 2014 (r355678)
+++ head/security/vuxml/vuln.xml Thu May 29 09:22:28 2014 (r355679)
@@ -58,30 +58,7 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="f99a4686-e694-11e3-9032-000c2980a9f3">
- <topic>exim -- Remote Code Execution</topic>
- <affects>
- <package>
- <name>exim</name>
- <range><eq>4.82</eq></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>The exim development team reports:</p>
- <blockquote cite="https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html">
- <p>When built with DMARC support, 4.82 is vulnerable to a remote
- code exeuction flaw.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <cvename>CVE-2014-2957</cvename>
- <url>https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html</url>
- </references>
- <dates>
- <discovery>2014-05-28</discovery>
- <entry>2014-05-28</entry>
- </dates>
+ <cancelled/>
</vuln>
<vuln vid="688e73a2-e514-11e3-a52a-98fc11cdc4f5">
More information about the svn-ports-head
mailing list