Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Aug 2016 21:50:02 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r420109 - head/security/vuxml
Message-ID:  <201608112150.u7BLo26v099404@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Thu Aug 11 21:50:02 2016
New Revision: 420109
URL: https://svnweb.freebsd.org/changeset/ports/420109

Log:
  Correct old vuxml entries for FreeBSD that use <ge>0</ge> or a <ge> without an <le>
  
  One entry has been cancelled in preference of a much newer entry referring to
  the same CVE as it has more detail.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Aug 11 21:33:59 2016	(r420108)
+++ head/security/vuxml/vuln.xml	Thu Aug 11 21:50:02 2016	(r420109)
@@ -121010,7 +121010,7 @@ http_access deny Gopher</pre>
       </package>
       <package>
 	<name>FreeBSD</name>
-	<range><ge>4.7</ge></range>
+	<range><le>4.7</le></range>
       </package>
     </affects>
     <description>
@@ -121045,7 +121045,7 @@ http_access deny Gopher</pre>
     <dates>
       <discovery>2004-08-17</discovery>
       <entry>2004-08-17</entry>
-      <modified>2004-08-28</modified>
+      <modified>2016-08-11</modified>
     </dates>
   </vuln>
 
@@ -123944,31 +123944,7 @@ http_access deny Gopher</pre>
   </vuln>
 
   <vuln vid="c7705712-92e6-11d8-8b29-0020ed76ef5a">
-    <topic>TCP denial-of-service attacks against long lived connections</topic>
-    <affects>
-      <package>
-	<name>FreeBSD</name>
-	<range><ge>0</ge></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p><a href="http://www.niscc.gov.uk/">NISCC</a>; /
-	  <a href="http://www.uniras.gov.uk/">UNIRAS</a>; has published
-	  an advisory that re-visits the long discussed spoofed TCP RST
-	  denial-of-service vulnerability.  This new look emphasizes
-	  the fact that for some applications such attacks are
-	  practically feasible.</p>
-      </body>
-    </description>
-    <references>
-      <cvename>CVE-2004-0230</cvename>
-      <url>http://www.uniras.gov.uk/vuls/2004/236929/index.htm</url>;
-    </references>
-    <dates>
-      <discovery>1995-06-01</discovery>
-      <entry>2004-04-23</entry>
-    </dates>
+    <cancelled superseded="729c4a9f-6007-11e6-a6c3-14dae9d210b8"/>
   </vuln>
 
   <vuln vid="99230277-8fb4-11d8-8b29-0020ed76ef5a">
@@ -124090,7 +124066,7 @@ http_access deny Gopher</pre>
       </package>
       <package>
 	<name>FreeBSD</name>
-	<range><ge>0</ge></range>
+	<range><lt>5.2.1</lt></range>
       </package>
     </affects>
     <description>
@@ -124115,7 +124091,7 @@ http_access deny Gopher</pre>
     <dates>
       <discovery>2004-03-12</discovery>
       <entry>2004-03-31</entry>
-      <modified>2004-04-14</modified>
+      <modified>2016-08-11</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201608112150.u7BLo26v099404>