aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsem <sem@FreeBSD.org>2005-11-07 01:28:04 +0800
committersem <sem@FreeBSD.org>2005-11-07 01:28:04 +0800
commitc3a38a1b44a0d435ef8794490327630ca61ee07a (patch)
tree38570862271764c00b35bfaf8705fff38cffe18e /security
parent6d22e74d04150cd2a7cd8d8b323d9e8597856089 (diff)
downloadfreebsd-ports-gnome-c3a38a1b44a0d435ef8794490327630ca61ee07a.tar.gz
freebsd-ports-gnome-c3a38a1b44a0d435ef8794490327630ca61ee07a.tar.zst
freebsd-ports-gnome-c3a38a1b44a0d435ef8794490327630ca61ee07a.zip
- Add missed </p> tag [1]
- Modify 594eb447-e398-11d9-a8bd-000cf18bbe54 entry: ruby 1.6.x is not affected this vulnerability, it have no XMLRPC support. Pointy hat to: simon [1]
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml5
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 28e92235f62d..f85d1e4242e6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -53,7 +53,7 @@ Note: Please add new entries to the beginning of this file.
<p>To be vulnerable, a user must explicitly install a
publicly released malicious package using the PEAR
installer, or explicitly install a package that depends on
- a malicious package.
+ a malicious package.</p>
</blockquote>
</body>
</description>
@@ -4494,7 +4494,7 @@ Note: Please add new entries to the beginning of this file.
<package>
<name>ruby</name>
<name>ruby_static</name>
- <range><le>1.8.2_3</le></range>
+ <range><gt>1.8.*</gt><lt>1.8.2_3</lt></range>
</package>
</affects>
<description>
@@ -4518,6 +4518,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2005-06-22</discovery>
<entry>2005-06-23</entry>
+ <modified>2005-11-06</modified>
</dates>
</vuln>