Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 9 Mar 2014 09:15:18 +0000 (UTC)
From:      Koop Mast <kwm@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org
Subject:   svn commit: r347558 - branches/2014Q1/security/vuxml
Message-ID:  <201403090915.s299FIqt058753@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: kwm
Date: Sun Mar  9 09:15:18 2014
New Revision: 347558
URL: http://svnweb.freebsd.org/changeset/ports/347558
QAT: https://qat.redports.org/buildarchive/r347558/

Log:
  MFH: r347557
  
  Unbreak vuxml.
  
  Submitted by:	battlez
  Approved by:	portmgr (erwin@)

Modified:
  branches/2014Q1/security/vuxml/vuln.xml
Directory Properties:
  branches/2014Q1/   (props changed)

Modified: branches/2014Q1/security/vuxml/vuln.xml
==============================================================================
--- branches/2014Q1/security/vuxml/vuln.xml	Sun Mar  9 08:43:48 2014	(r347557)
+++ branches/2014Q1/security/vuxml/vuln.xml	Sun Mar  9 09:15:18 2014	(r347558)
@@ -63,7 +63,7 @@ Note:  Please add new entries to the beg
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Mateusz Jurczyk reports:</p>
 	<blockquote cite="http://savannah.nongnu.org/bugs/?41697">;
-	  <p>Out of bounds stack-based read/write in cf2_hintmap_build.<br> 
+	  <p>Out of bounds stack-based read/write in cf2_hintmap_build.
              This is a critical vulnerability in the CFF Rasterizer code
              recently contributed by Adobe, leading to potential arbitrary
              code execution in the context of the FreeType2 library client.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403090915.s299FIqt058753>