svn commit: r382184 - head/security/vuxml

Ryan Steinmetz zi at FreeBSD.org
Tue Mar 24 22:15:49 UTC 2015


Author: zi
Date: Tue Mar 24 22:15:48 2015
New Revision: 382184
URL: https://svnweb.freebsd.org/changeset/ports/382184
QAT: https://qat.redports.org/buildarchive/r382184/

Log:
  - Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764
  - Fix blockquote style to match rest

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Mar 24 21:55:15 2015	(r382183)
+++ head/security/vuxml/vuln.xml	Tue Mar 24 22:15:48 2015	(r382184)
@@ -61,11 +61,11 @@ Notes:
     <topic>GNU binutils -- multiple vulnerabilities</topic>
     <affects>
       <package>
-	<name>devel/cross-binutils</name>
+	<name>cross-binutils</name>
 	<range><lt>2.25</lt></range>
       </package>
       <package>
-	<name>devel/mingw64-binutils</name>
+	<name>mingw64-binutils</name>
 	<range><lt>2.25</lt></range>
       </package>
     </affects>
@@ -74,29 +74,32 @@ Notes:
 	<p>US-CERT/NIST reports:</p>
 	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501">
 	  <p>The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU
-	  binutils 2.24 and earlier allows remote attackers to cause a
-	  denial of service (out-of-bounds write) and possibly have other
-	  unspecified impact via a crafted NumberOfRvaAndSizes field in the
-	  AOUT header in a PE executable.</p>
+	    binutils 2.24 and earlier allows remote attackers to cause a
+	    denial of service (out-of-bounds write) and possibly have other
+	    unspecified impact via a crafted NumberOfRvaAndSizes field in the
+	    AOUT header in a PE executable.</p>
 	</blockquote>
 	<p>US-CERT/NIST reports:</p>
 	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502">
 	  <p>Heap-based buffer overflow in the pe_print_edata function in
-	  bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
-	  attackers to cause a denial of service (crash) and possibly have
-	  other unspecified impact via a truncated export table in a PE
-	  file.</p>
+	    bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
+	    attackers to cause a denial of service (crash) and possibly have
+	    other unspecified impact via a truncated export table in a PE
+	    file.</p>
 	</blockquote>
 	<p>US-CERT/NIST reports:</p>
 	<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503">
 	  <p>Stack-based buffer overflow in the ihex_scan function in
-	  bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
-	  attackers to cause a denial of service (crash) and possibly have
-	  other unspecified impact via a crafted ihex file.</p>
+	    bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
+	    attackers to cause a denial of service (crash) and possibly have
+	    other unspecified impact via a crafted ihex file.</p>
 	</blockquote>
       </body>
     </description>
     <references>
+      <cvename>CVE-2014-8501</cvename>
+      <cvename>CVE-2014-8502</cvename>
+      <cvename>CVE-2014-8503</cvename>
       <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501</url>
       <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502</url>
       <url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503</url>


More information about the svn-ports-head mailing list