svn commit: r535672 - head/security/vuxml
Sunpoet Po-Chuan Hsieh
sunpoet at FreeBSD.org
Sun May 17 20:18:35 UTC 2020
Author: sunpoet
Date: Sun May 17 20:18:31 2020
New Revision: 535672
URL: https://svnweb.freebsd.org/changeset/ports/535672
Log:
Update json-c vulnerability
- While I'm here, fix format
json-c 0.14 will land the ports tree along with the fix, thus I change it to 0.14.
PR: 246389
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sun May 17 20:18:24 2020 (r535671)
+++ head/security/vuxml/vuln.xml Sun May 17 20:18:31 2020 (r535672)
@@ -69,7 +69,7 @@ Notes:
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Ruby on Rails blog:</p>
- <blockquote cite="https://weblog.rubyonrails.org/2020/5/16/rails-4-2-11-3-has-been-released/">
+ <blockquote cite="https://weblog.rubyonrails.org/2020/5/16/rails-4-2-11-3-has-been-released/">
<p>Due to an unfortunate oversight, Rails 4.2.11.2 has a missing constant
error. To address this Rails 4.2.11.3 has been released.</p>
<p>The original announcement for CVE-2020-8163 has a follow-up message
@@ -155,7 +155,7 @@ Notes:
<affects>
<package>
<name>json-c</name>
- <range><lt>0.15</lt></range>
+ <range><lt>0.14</lt></range>
</package>
</affects>
<description>
@@ -179,6 +179,7 @@ Notes:
<dates>
<discovery>2020-05-02</discovery>
<entry>2020-05-14</entry>
+ <modified>2020-05-17</modified>
</dates>
</vuln>
@@ -1027,7 +1028,7 @@ If successful, a malicious third party could trigger e
<package>
<name>mariadb103-server</name>
<range><lt>10.3.23</lt></range>
- </package>
+ </package>
<package>
<name>mariadb104-server</name>
<range><lt>10.4.13</lt></range>
More information about the svn-ports-all
mailing list