1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-29 01:13:08 +00:00

- Add missed </p> tag [1]

- Modify 594eb447-e398-11d9-a8bd-000cf18bbe54 entry:
  ruby 1.6.x is not affected this vulnerability,
  it have no XMLRPC support.

Pointy hat to:	simon [1]
This commit is contained in:
Sergey Matveychuk 2005-11-06 17:28:04 +00:00
parent 583ba7837a
commit 3a95aa3424
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=147447

View File

@ -53,7 +53,7 @@ Note: Please add new entries to the beginning of this file.
<p>To be vulnerable, a user must explicitly install a
publicly released malicious package using the PEAR
installer, or explicitly install a package that depends on
a malicious package.
a malicious package.</p>
</blockquote>
</body>
</description>
@ -4494,7 +4494,7 @@ Note: Please add new entries to the beginning of this file.
<package>
<name>ruby</name>
<name>ruby_static</name>
<range><le>1.8.2_3</le></range>
<range><gt>1.8.*</gt><lt>1.8.2_3</lt></range>
</package>
</affects>
<description>
@ -4518,6 +4518,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2005-06-22</discovery>
<entry>2005-06-23</entry>
<modified>2005-11-06</modified>
</dates>
</vuln>