Fix: <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="6e38e7eb-277a-4116-b4a8-66b2a18a60f0"> <topic>ghostscript8 -- Ghostscript pdf_base_font_alloc Buffer Overflow Vulnerability</topic> <affects> <package> <name>ghostscript8</name> <name>ghostscript8-nox11</name> <range><lt>8.64</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>SecurityFocus reports:</p> <blockquote cite="http://www.securityfocus.com/bid/34340/"> <p>There is a buffer overflow vulnerability in Ghostscript in the pdf_base_font_alloc function in gdevpdtb.c.</p> </blockquote> </body> </description> <references> <bid>34340</bid> <url>http://www.securityfocus.com/bid/34340/</url> </references> <dates> <discovery>2009-02-03</discovery> <entry>2009-04-02</entry> </dates> </vuln>
Responsible Changed From-To: freebsd-ports-bugs->miwi I'll take it.
State Changed From-To: open->closed Committed. Thanks!
miwi 2009-05-13 08:23:57 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: - Document ghostscript8 -- Buffer Overflow Vulnerability PR: 133331 (baesed on) Revision Changes Path 1.1931 +35 -1 ports/security/vuxml/vuln.xml _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"