svn commit: r344452 - head/security/vuxml
Li-Wen Hsu
lwhsu at FreeBSD.org
Sat Feb 15 17:05:13 UTC 2014
Author: lwhsu
Date: Sat Feb 15 17:05:12 2014
New Revision: 344452
URL: http://svnweb.freebsd.org/changeset/ports/344452
QAT: https://qat.redports.org/buildarchive/r344452/
Log:
- Last whitespace change
- Sort CVE entries
Notified by: remko
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Feb 15 17:04:26 2014 (r344451)
+++ head/security/vuxml/vuln.xml Sat Feb 15 17:05:12 2014 (r344452)
@@ -101,10 +101,10 @@ Note: Please add new entries to the beg
<li>
<p>iSECURITY-105</p>
<p>In some places, Jenkins XML API uses XStream to deserialize
- arbitrary content, which is affected by CVE-2013-7285 reported
- against XStream. This allows malicious users of Jenkins with
- a limited set of permissions to execute arbitrary code inside
- Jenkins master.</p>
+ arbitrary content, which is affected by CVE-2013-7285 reported
+ against XStream. This allows malicious users of Jenkins with
+ a limited set of permissions to execute arbitrary code inside
+ Jenkins master.</p>
</li>
<li>
<p>SECURITY-76 & SECURITY-88 / CVE-2013-5573</p>
@@ -203,8 +203,8 @@ Note: Please add new entries to the beg
</description>
<references>
<url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14</url>
- <cvename>CVE-2013-7285</cvename>
<cvename>CVE-2013-5573</cvename>
+ <cvename>CVE-2013-7285</cvename>
</references>
<dates>
<discovery>2014-02-14</discovery>
More information about the svn-ports-all
mailing list