Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Mar 2015 22:15:49 +0000 (UTC)
From:      Ryan Steinmetz <zi@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r382184 - head/security/vuxml
Message-ID:  <201503242215.t2OMFnWK034850@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: zi
Date: Tue Mar 24 22:15:48 2015
New Revision: 382184
URL: https://svnweb.freebsd.org/changeset/ports/382184
QAT: https://qat.redports.org/buildarchive/r382184/

Log:
  - Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764
  - Fix blockquote style to match rest

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Mar 24 21:55:15 2015	(r382183)
+++ head/security/vuxml/vuln.xml	Tue Mar 24 22:15:48 2015	(r382184)
@@ -61,11 +61,11 @@ Notes:
     <topic>GNU binutils -- multiple vulnerabilities</topic>
     <affects>
       <package>
-	<name>devel/cross-binutils</name>
+	<name>cross-binutils</name>
 	<range><lt>2.25</lt></range>
       </package>
       <package>
-	<name>devel/mingw64-binutils</name>
+	<name>mingw64-binutils</name>
 	<range><lt>2.25</lt></range>
       </package>
     </affects>
@@ -74,29 +74,32 @@ Notes:
 	<p>US-CERT/NIST reports:</p>
 	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501">;
 	  <p>The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU
-	  binutils 2.24 and earlier allows remote attackers to cause a
-	  denial of service (out-of-bounds write) and possibly have other
-	  unspecified impact via a crafted NumberOfRvaAndSizes field in the
-	  AOUT header in a PE executable.</p>
+	    binutils 2.24 and earlier allows remote attackers to cause a
+	    denial of service (out-of-bounds write) and possibly have other
+	    unspecified impact via a crafted NumberOfRvaAndSizes field in the
+	    AOUT header in a PE executable.</p>
 	</blockquote>
 	<p>US-CERT/NIST reports:</p>
 	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502">;
 	  <p>Heap-based buffer overflow in the pe_print_edata function in
-	  bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
-	  attackers to cause a denial of service (crash) and possibly have
-	  other unspecified impact via a truncated export table in a PE
-	  file.</p>
+	    bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
+	    attackers to cause a denial of service (crash) and possibly have
+	    other unspecified impact via a truncated export table in a PE
+	    file.</p>
 	</blockquote>
 	<p>US-CERT/NIST reports:</p>
 	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503">;
 	  <p>Stack-based buffer overflow in the ihex_scan function in
-	  bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
-	  attackers to cause a denial of service (crash) and possibly have
-	  other unspecified impact via a crafted ihex file.</p>
+	    bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
+	    attackers to cause a denial of service (crash) and possibly have
+	    other unspecified impact via a crafted ihex file.</p>
 	</blockquote>
       </body>
     </description>
     <references>
+      <cvename>CVE-2014-8501</cvename>
+      <cvename>CVE-2014-8502</cvename>
+      <cvename>CVE-2014-8503</cvename>
       <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501</url>;
       <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502</url>;
       <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503</url>;



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201503242215.t2OMFnWK034850>