svn commit: r344452 - head/security/vuxml

Li-Wen Hsu lwhsu at FreeBSD.org
Sat Feb 15 17:05:13 UTC 2014


Author: lwhsu
Date: Sat Feb 15 17:05:12 2014
New Revision: 344452
URL: http://svnweb.freebsd.org/changeset/ports/344452
QAT: https://qat.redports.org/buildarchive/r344452/

Log:
  - Last whitespace change
  - Sort CVE entries
  
  Notified by:	remko

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Feb 15 17:04:26 2014	(r344451)
+++ head/security/vuxml/vuln.xml	Sat Feb 15 17:05:12 2014	(r344452)
@@ -101,10 +101,10 @@ Note:  Please add new entries to the beg
 	    <li>
 	      <p>iSECURITY-105</p>
 	      <p>In some places, Jenkins XML API uses XStream to deserialize
-	          arbitrary content, which is affected by CVE-2013-7285 reported
-	           against XStream. This allows malicious users of Jenkins with
-	           a limited set of permissions to execute arbitrary code inside
-	           Jenkins master.</p>
+	         arbitrary content, which is affected by CVE-2013-7285 reported
+	         against XStream. This allows malicious users of Jenkins with
+	         a limited set of permissions to execute arbitrary code inside
+	         Jenkins master.</p>
 	    </li>
 	    <li>
 	      <p>SECURITY-76 & SECURITY-88 / CVE-2013-5573</p>
@@ -203,8 +203,8 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14</url>
-      <cvename>CVE-2013-7285</cvename>
       <cvename>CVE-2013-5573</cvename>
+      <cvename>CVE-2013-7285</cvename>
     </references>
     <dates>
       <discovery>2014-02-14</discovery>


More information about the svn-ports-all mailing list