svn commit: r355647 - head/security/vuxml
Ryan Steinmetz
zi at FreeBSD.org
Wed May 28 18:36:46 UTC 2014
Author: zi
Date: Wed May 28 18:36:46 2014
New Revision: 355647
URL: http://svnweb.freebsd.org/changeset/ports/355647
QAT: https://qat.redports.org/buildarchive/r355647/
Log:
- Document exim vulnerability (CVE-2014-2957)
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed May 28 18:03:11 2014 (r355646)
+++ head/security/vuxml/vuln.xml Wed May 28 18:36:46 2014 (r355647)
@@ -57,6 +57,33 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f99a4686-e694-11e3-9032-000c2980a9f3">
+ <topic>exim -- Remote Code Execution</topic>
+ <affects>
+ <package>
+ <name>exim</name>
+ <range><eq>4.82</eq></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The exim development team reports:</p>
+ <blockquote cite="https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html">
+ <p>When built with DMARC support, 4.82 is vulnerable to a remote
+ code exeuction flaw.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-2957</cvename>
+ <url>https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html</url>
+ </references>
+ <dates>
+ <discovery>2014-05-28</discovery>
+ <entry>2014-05-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="688e73a2-e514-11e3-a52a-98fc11cdc4f5">
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list