Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 11 Feb 2019 19:11:34 +0000 (UTC)
From:      Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r492731 - head/security/vuxml
Message-ID:  <201902111911.x1BJBYAY059061@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: sunpoet
Date: Mon Feb 11 19:11:34 2019
New Revision: 492731
URL: https://svnweb.freebsd.org/changeset/ports/492731

Log:
  Fix r492723 for the name of NVD report

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Feb 11 19:00:28 2019	(r492730)
+++ head/security/vuxml/vuln.xml	Mon Feb 11 19:11:34 2019	(r492731)
@@ -68,7 +68,7 @@ Notes:
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>SO-AND-SO reports:</p>
+	<p>NVD reports:</p>
 	<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2018-5727">;
 	  <p>In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the
 	    opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could
@@ -85,6 +85,7 @@ Notes:
     <dates>
       <discovery>2017-12-08</discovery>
       <entry>2019-02-11</entry>
+      <modified>2019-02-11</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201902111911.x1BJBYAY059061>