Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Oct 2013 10:56:57 +0000 (UTC)
From:      Alex Kozlov <ak@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r330627 - head/security/vuxml
Message-ID:  <201310171056.r9HAuvjb018211@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: ak
Date: Thu Oct 17 10:56:56 2013
New Revision: 330627
URL: http://svnweb.freebsd.org/changeset/ports/330627

Log:
  - Fix year, move entry up

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Oct 17 10:46:54 2013	(r330626)
+++ head/security/vuxml/vuln.xml	Thu Oct 17 10:56:56 2013	(r330627)
@@ -51,6 +51,38 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="8c9b48d1-3715-11e3-a624-00262d8b701d">
+    <topic>dropbear -- exposure of sensitive information, DoS</topic>
+    <affects>
+      <package>
+	<name>dropbear</name>
+	<range><ge>2012.55</ge><lt>2013.59</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Dropbear project reports:</p>
+	<blockquote cite="http://secunia.com/advisories/55173/">;
+	  <p>A weakness and a vulnerability have been reported in Dropbear
+	     SSH Server, which can be exploited by malicious people to disclose
+	     certain sensitive information and cause a DoS.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <bid>62958</bid>
+      <bid>62993</bid>
+      <cvename>CVE-2013-4421</cvename>
+      <cvename>CVE-2013-4434</cvename>
+      <url>http://secunia.com/advisories/55173</url>;
+    </references>
+    <dates>
+      <discovery>2013-05-08</discovery>
+      <discovery>2013-10-03</discovery>
+      <entry>2013-10-17</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="710cd5d5-35cb-11e3-85f9-00262d5ed8ee">
     <topic>chromium -- multiple vulnerabilities</topic>
     <affects>
@@ -90,38 +122,6 @@ Note:  Please add new entries to the beg
     </dates>
   </vuln>
 
-  <vuln vid="8c9b48d1-3715-11e3-a624-00262d8b701d">
-    <topic>dropbear -- exposure of sensitive information, DoS</topic>
-    <affects>
-      <package>
-	<name>dropbear</name>
-	<range><ge>2012.55</ge><lt>2013.59</lt></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>The Dropbear project reports:</p>
-	<blockquote cite="http://secunia.com/advisories/55173/">;
-	  <p>A weakness and a vulnerability have been reported in Dropbear
-	     SSH Server, which can be exploited by malicious people to disclose
-	     certain sensitive information and cause a DoS.</p>
-	</blockquote>
-      </body>
-    </description>
-    <references>
-      <bid>62958</bid>
-      <bid>62993</bid>
-      <cvename>CVE-2013-4421</cvename>
-      <cvename>CVE-2013-4434</cvename>
-      <url>http://secunia.com/advisories/55173</url>;
-    </references>
-    <dates>
-      <discovery>2013-05-08</discovery>
-      <discovery>2013-10-03</discovery>
-      <entry>2012-10-17</entry>
-    </dates>
-  </vuln>
-
   <vuln vid="9003b500-31e3-11e3-b0d0-20cf30e32f6d">
     <topic>mod_fcgid -- possible heap buffer overwrite</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201310171056.r9HAuvjb018211>