Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 10 Nov 2012 15:17:31 +0000 (UTC)
From:      Steve Wills <swills@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r307286 - head/security/vuxml
Message-ID:  <201211101517.qAAFHVjv041864@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: swills
Date: Sat Nov 10 15:17:31 2012
New Revision: 307286
URL: http://svnweb.freebsd.org/changeset/ports/307286

Log:
  - Improve latest ruby entry slightly
  
  Feature safe:	yes

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Nov 10 15:07:09 2012	(r307285)
+++ head/security/vuxml/vuln.xml	Sat Nov 10 15:17:31 2012	(r307286)
@@ -85,7 +85,7 @@ Note:  Please add new entries to the beg
   </vuln>
 
   <vuln vid="5e647ca3-2aea-11e2-b745-001fd0af1a4c">
-    <topic>lang/ruby19 -- Hash-flooding DoS vulnerability for ruby 1.9</topic>
+    <topic>ruby -- Hash-flooding DoS vulnerability for ruby 1.9</topic>
     <affects>
       <package>
         <name>ruby</name>
@@ -94,7 +94,7 @@ Note:  Please add new entries to the beg
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-        <p>Hash-flooding DoS vulnerability</p>
+        <p>The official ruby site reports:</p>
         <blockquote cite="http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/">;
           <p>Carefully crafted sequence of strings can cause a denial of service
              attack on the service that parses the sequence to create a Hash



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211101517.qAAFHVjv041864>