aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorzi <zi@FreeBSD.org>2015-03-25 06:15:48 +0800
committerzi <zi@FreeBSD.org>2015-03-25 06:15:48 +0800
commitde6c295f80cbf9bf9ee451a705b2e1d68ddfeca3 (patch)
tree96c9ee9caedcf3da0251969ea30cd93239aad18c /security
parent883115f4ed5c2cfa32492acd512aec16fd7cf442 (diff)
downloadfreebsd-ports-gnome-de6c295f80cbf9bf9ee451a705b2e1d68ddfeca3.tar.gz
freebsd-ports-gnome-de6c295f80cbf9bf9ee451a705b2e1d68ddfeca3.tar.zst
freebsd-ports-gnome-de6c295f80cbf9bf9ee451a705b2e1d68ddfeca3.zip
- Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764
- Fix blockquote style to match rest
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 16 insertions, 13 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5e22817596af..1d366ce22bc2 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -61,11 +61,11 @@ Notes:
<topic>GNU binutils -- multiple vulnerabilities</topic>
<affects>
<package>
- <name>devel/cross-binutils</name>
+ <name>cross-binutils</name>
<range><lt>2.25</lt></range>
</package>
<package>
- <name>devel/mingw64-binutils</name>
+ <name>mingw64-binutils</name>
<range><lt>2.25</lt></range>
</package>
</affects>
@@ -74,29 +74,32 @@ Notes:
<p>US-CERT/NIST reports:</p>
<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501">
<p>The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU
- binutils 2.24 and earlier allows remote attackers to cause a
- denial of service (out-of-bounds write) and possibly have other
- unspecified impact via a crafted NumberOfRvaAndSizes field in the
- AOUT header in a PE executable.</p>
+ binutils 2.24 and earlier allows remote attackers to cause a
+ denial of service (out-of-bounds write) and possibly have other
+ unspecified impact via a crafted NumberOfRvaAndSizes field in the
+ AOUT header in a PE executable.</p>
</blockquote>
<p>US-CERT/NIST reports:</p>
<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502">
<p>Heap-based buffer overflow in the pe_print_edata function in
- bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
- attackers to cause a denial of service (crash) and possibly have
- other unspecified impact via a truncated export table in a PE
- file.</p>
+ bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote
+ attackers to cause a denial of service (crash) and possibly have
+ other unspecified impact via a truncated export table in a PE
+ file.</p>
</blockquote>
<p>US-CERT/NIST reports:</p>
<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503">
<p>Stack-based buffer overflow in the ihex_scan function in
- bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
- attackers to cause a denial of service (crash) and possibly have
- other unspecified impact via a crafted ihex file.</p>
+ bfd/ihex.c in GNU binutils 2.24 and earlier allows remote
+ attackers to cause a denial of service (crash) and possibly have
+ other unspecified impact via a crafted ihex file.</p>
</blockquote>
</body>
</description>
<references>
+ <cvename>CVE-2014-8501</cvename>
+ <cvename>CVE-2014-8502</cvename>
+ <cvename>CVE-2014-8503</cvename>
<url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8501</url>
<url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8502</url>
<url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8503</url>