Date: Thu, 17 Oct 2013 10:56:57 +0000 (UTC) From: Alex Kozlov <ak@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r330627 - head/security/vuxml Message-ID: <201310171056.r9HAuvjb018211@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: ak Date: Thu Oct 17 10:56:56 2013 New Revision: 330627 URL: http://svnweb.freebsd.org/changeset/ports/330627 Log: - Fix year, move entry up Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Oct 17 10:46:54 2013 (r330626) +++ head/security/vuxml/vuln.xml Thu Oct 17 10:56:56 2013 (r330627) @@ -51,6 +51,38 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8c9b48d1-3715-11e3-a624-00262d8b701d"> + <topic>dropbear -- exposure of sensitive information, DoS</topic> + <affects> + <package> + <name>dropbear</name> + <range><ge>2012.55</ge><lt>2013.59</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Dropbear project reports:</p> + <blockquote cite="http://secunia.com/advisories/55173/"> + <p>A weakness and a vulnerability have been reported in Dropbear + SSH Server, which can be exploited by malicious people to disclose + certain sensitive information and cause a DoS.</p> + </blockquote> + </body> + </description> + <references> + <bid>62958</bid> + <bid>62993</bid> + <cvename>CVE-2013-4421</cvename> + <cvename>CVE-2013-4434</cvename> + <url>http://secunia.com/advisories/55173</url> + </references> + <dates> + <discovery>2013-05-08</discovery> + <discovery>2013-10-03</discovery> + <entry>2013-10-17</entry> + </dates> + </vuln> + <vuln vid="710cd5d5-35cb-11e3-85f9-00262d5ed8ee"> <topic>chromium -- multiple vulnerabilities</topic> <affects> @@ -90,38 +122,6 @@ Note: Please add new entries to the beg </dates> </vuln> - <vuln vid="8c9b48d1-3715-11e3-a624-00262d8b701d"> - <topic>dropbear -- exposure of sensitive information, DoS</topic> - <affects> - <package> - <name>dropbear</name> - <range><ge>2012.55</ge><lt>2013.59</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The Dropbear project reports:</p> - <blockquote cite="http://secunia.com/advisories/55173/"> - <p>A weakness and a vulnerability have been reported in Dropbear - SSH Server, which can be exploited by malicious people to disclose - certain sensitive information and cause a DoS.</p> - </blockquote> - </body> - </description> - <references> - <bid>62958</bid> - <bid>62993</bid> - <cvename>CVE-2013-4421</cvename> - <cvename>CVE-2013-4434</cvename> - <url>http://secunia.com/advisories/55173</url> - </references> - <dates> - <discovery>2013-05-08</discovery> - <discovery>2013-10-03</discovery> - <entry>2012-10-17</entry> - </dates> - </vuln> - <vuln vid="9003b500-31e3-11e3-b0d0-20cf30e32f6d"> <topic>mod_fcgid -- possible heap buffer overwrite</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201310171056.r9HAuvjb018211>