From owner-svn-ports-all@FreeBSD.ORG Sat Feb 15 17:05:13 2014
Return-Path:
Delivered-To: svn-ports-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 38BEA20B;
Sat, 15 Feb 2014 17:05:13 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 24D5C17C1;
Sat, 15 Feb 2014 17:05:13 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1FH5Drg013325;
Sat, 15 Feb 2014 17:05:13 GMT (envelope-from lwhsu@svn.freebsd.org)
Received: (from lwhsu@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1FH5Cc7013324;
Sat, 15 Feb 2014 17:05:12 GMT (envelope-from lwhsu@svn.freebsd.org)
Message-Id: <201402151705.s1FH5Cc7013324@svn.freebsd.org>
From: Li-Wen Hsu
Date: Sat, 15 Feb 2014 17:05:12 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r344452 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: SVN commit messages for the ports tree
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sat, 15 Feb 2014 17:05:13 -0000
Author: lwhsu
Date: Sat Feb 15 17:05:12 2014
New Revision: 344452
URL: http://svnweb.freebsd.org/changeset/ports/344452
QAT: https://qat.redports.org/buildarchive/r344452/
Log:
- Last whitespace change
- Sort CVE entries
Notified by: remko
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Feb 15 17:04:26 2014 (r344451)
+++ head/security/vuxml/vuln.xml Sat Feb 15 17:05:12 2014 (r344452)
@@ -101,10 +101,10 @@ Note: Please add new entries to the beg
iSECURITY-105
In some places, Jenkins XML API uses XStream to deserialize
- arbitrary content, which is affected by CVE-2013-7285 reported
- against XStream. This allows malicious users of Jenkins with
- a limited set of permissions to execute arbitrary code inside
- Jenkins master.
+ arbitrary content, which is affected by CVE-2013-7285 reported
+ against XStream. This allows malicious users of Jenkins with
+ a limited set of permissions to execute arbitrary code inside
+ Jenkins master.
SECURITY-76 & SECURITY-88 / CVE-2013-5573
@@ -203,8 +203,8 @@ Note: Please add new entries to the beg
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
- CVE-2013-7285
CVE-2013-5573
+ CVE-2013-7285
2014-02-14