diff options
author | feld <feld@FreeBSD.org> | 2016-08-12 05:50:02 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2016-08-12 05:50:02 +0800 |
commit | 7532f7b77b528603072220718d50a8bb33382fde (patch) | |
tree | 96d5825883585962536a13060859362b317086fa /security | |
parent | 99a9e5bde6dcca95aad98c4d0d7c7bb5360f0657 (diff) | |
download | freebsd-ports-gnome-7532f7b77b528603072220718d50a8bb33382fde.tar.gz freebsd-ports-gnome-7532f7b77b528603072220718d50a8bb33382fde.tar.zst freebsd-ports-gnome-7532f7b77b528603072220718d50a8bb33382fde.zip |
Correct old vuxml entries for FreeBSD that use <ge>0</ge> or a <ge> without an <le>
One entry has been cancelled in preference of a much newer entry referring to
the same CVE as it has more detail.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 34 |
1 files changed, 5 insertions, 29 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 727d190d0995..4c45d6bc1ac3 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -121010,7 +121010,7 @@ http_access deny Gopher</pre> </package> <package> <name>FreeBSD</name> - <range><ge>4.7</ge></range> + <range><le>4.7</le></range> </package> </affects> <description> @@ -121045,7 +121045,7 @@ http_access deny Gopher</pre> <dates> <discovery>2004-08-17</discovery> <entry>2004-08-17</entry> - <modified>2004-08-28</modified> + <modified>2016-08-11</modified> </dates> </vuln> @@ -123944,31 +123944,7 @@ http_access deny Gopher</pre> </vuln> <vuln vid="c7705712-92e6-11d8-8b29-0020ed76ef5a"> - <topic>TCP denial-of-service attacks against long lived connections</topic> - <affects> - <package> - <name>FreeBSD</name> - <range><ge>0</ge></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p><a href="http://www.niscc.gov.uk/">NISCC</a> / - <a href="http://www.uniras.gov.uk/">UNIRAS</a> has published - an advisory that re-visits the long discussed spoofed TCP RST - denial-of-service vulnerability. This new look emphasizes - the fact that for some applications such attacks are - practically feasible.</p> - </body> - </description> - <references> - <cvename>CVE-2004-0230</cvename> - <url>http://www.uniras.gov.uk/vuls/2004/236929/index.htm</url> - </references> - <dates> - <discovery>1995-06-01</discovery> - <entry>2004-04-23</entry> - </dates> + <cancelled superseded="729c4a9f-6007-11e6-a6c3-14dae9d210b8"/> </vuln> <vuln vid="99230277-8fb4-11d8-8b29-0020ed76ef5a"> @@ -124090,7 +124066,7 @@ http_access deny Gopher</pre> </package> <package> <name>FreeBSD</name> - <range><ge>0</ge></range> + <range><lt>5.2.1</lt></range> </package> </affects> <description> @@ -124115,7 +124091,7 @@ http_access deny Gopher</pre> <dates> <discovery>2004-03-12</discovery> <entry>2004-03-31</entry> - <modified>2004-04-14</modified> + <modified>2016-08-11</modified> </dates> </vuln> |