Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Nov 2008 14:50:59 -0500 (EST)
From:      "Steven M. Christey" <coley@linus.mitre.org>
To:        Eygene Ryabinkin <rea-fbsd@codelabs.ru>
Cc:        Jille Timmermans <jille@quis.cx>, bug-followup@freebsd.org, "Steven M. Christey" <coley@linus.mitre.org>, freebsd-security@freebsd.org, mloveless@mitre.org, cve@mitre.org, coley@mitre.org
Subject:   Re: ports/128956: [patch] [vuxml] multiple vulnerabilities in PHP 5.2.6
Message-ID:  <Pine.GSO.4.51.0811181449170.22800@faron.mitre.org>
In-Reply-To: <HFT9UPqQxMKr5hueUanFpyCwPgI@BWOFZFtpv6375xxU2Y12WR4LQqg>
References:  <20081118103433.38D5817115@shadow.codelabs.ru> <4922B371.6070002@quis.cx> <TqoTo5jliabZzOUld/zrRy5vtzI@%2BC9avPjAe6kfv7rH%2BxyHzR2RFw8> <4922B6F9.2000408@quis.cx> <9a6isDG2HABVFiTQKRYgHLbugj0@N7cbPDipnvOyJMD9YzFbYf8QNqE> <Pine.GSO.4.51.0811180957530.22800@faron.mitre.org> <HFT9UPqQxMKr5hueUanFpyCwPgI@BWOFZFtpv6375xxU2Y12WR4LQqg>

next in thread | previous in thread | raw e-mail | index | archive | help

> So, the VuXML entry should be changed accordingly.  New content is
> attached.

Just for my own understanding, did the erroneous CVE description cause any
extra work on your part?  What if the desc had only said "5.2 through
5.2.6" at first?

I'm asking because I'm trying to understandind how people use CVE and what
impact our errors might have on others.

Thanks,
Steve



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.51.0811181449170.22800>