svn commit: r535672 - head/security/vuxml

Sunpoet Po-Chuan Hsieh sunpoet at FreeBSD.org
Sun May 17 20:18:35 UTC 2020


Author: sunpoet
Date: Sun May 17 20:18:31 2020
New Revision: 535672
URL: https://svnweb.freebsd.org/changeset/ports/535672

Log:
  Update json-c vulnerability
  
  - While I'm here, fix format
  
  json-c 0.14 will land the ports tree along with the fix, thus I change it to 0.14.
  
  PR:		246389

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun May 17 20:18:24 2020	(r535671)
+++ head/security/vuxml/vuln.xml	Sun May 17 20:18:31 2020	(r535672)
@@ -69,7 +69,7 @@ Notes:
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">
 	<p>Ruby on Rails blog:</p>
-	<blockquote cite="https://weblog.rubyonrails.org/2020/5/16/rails-4-2-11-3-has-been-released/"> 
+	<blockquote cite="https://weblog.rubyonrails.org/2020/5/16/rails-4-2-11-3-has-been-released/">
 	  <p>Due to an unfortunate oversight, Rails 4.2.11.2 has a missing constant
 	    error. To address this Rails 4.2.11.3 has been released.</p>
 	  <p>The original announcement for CVE-2020-8163 has a follow-up message
@@ -155,7 +155,7 @@ Notes:
     <affects>
       <package>
 	<name>json-c</name>
-	<range><lt>0.15</lt></range>
+	<range><lt>0.14</lt></range>
       </package>
     </affects>
     <description>
@@ -179,6 +179,7 @@ Notes:
     <dates>
       <discovery>2020-05-02</discovery>
       <entry>2020-05-14</entry>
+      <modified>2020-05-17</modified>
     </dates>
   </vuln>
 
@@ -1027,7 +1028,7 @@ If successful, a malicious third party could trigger e
       <package>
 	<name>mariadb103-server</name>
 	<range><lt>10.3.23</lt></range>
-      </package>  
+      </package>
       <package>
 	<name>mariadb104-server</name>
 	<range><lt>10.4.13</lt></range>


More information about the svn-ports-head mailing list