Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 4 Sep 2012 21:05:15 +0000 (UTC)
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r303672 - head/security/vuxml
Message-ID:  <201209042105.q84L5Flt018826@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mandree
Date: Tue Sep  4 21:05:15 2012
New Revision: 303672
URL: http://svn.freebsd.org/changeset/ports/303672

Log:
  Modify fetchmail vuln' URLs to established site.
  While at it, adjust the two oldest topics to current format, for uniformity,
  on, for instance, http://www.vuxml.org/freebsd/pkg-fetchmail.html.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Sep  4 20:56:27 2012	(r303671)
+++ head/security/vuxml/vuln.xml	Tue Sep  4 21:05:15 2012	(r303672)
@@ -22529,7 +22529,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2009-01.txt">;
 	  <p>Moxie Marlinspike demonstrated in July 2009 that some CAs would
 	    sign certificates that contain embedded NUL characters in the
 	    Common Name or subjectAltName fields of ITU-T X.509
@@ -22546,7 +22546,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2009-2666</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2009-01.txt</url>;
     </references>
     <dates>
       <discovery>2009-08-06</discovery>
@@ -31014,7 +31014,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2008-01.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2008-01.txt">;
 	  <p>2008-06-24 1.2  also fixed issue in report_complete (reported by
 	    Petr Uzel)</p>
 	</blockquote>
@@ -31022,7 +31022,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2008-2711</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2008-01.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2008-01.txt</url>;
     </references>
     <dates>
       <discovery>2008-06-24</discovery>
@@ -31214,7 +31214,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2008-01.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2008-01.txt">;
 	  <p>Gunter Nau reported fetchmail crashing on some messages; further
 	    debugging by Petr Uzel and Petr Cerny at Novell/SUSE Czech Republic
 	    dug up that this happened when fetchmail was trying to print, in
@@ -31229,7 +31229,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2008-2711</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2008-01.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2008-01.txt</url>;
     </references>
     <dates>
       <discovery>2008-06-13</discovery>
@@ -38779,7 +38779,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2007-01.txt">;
 	  <p>The POP3 standard, currently RFC-1939, has specified an optional,
 	    MD5-based authentication scheme called "APOP" which no longer
 	    should be considered secure.</p>
@@ -38795,7 +38795,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2007-1558</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2007-01.txt</url>;
     </references>
     <dates>
       <discovery>2007-04-06</discovery>
@@ -39934,7 +39934,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2006-03.txt">;
 	  <p>When delivering messages to a message delivery agent by means
 	    of the "mda" option, fetchmail can crash (by passing
 	    a NULL pointer to ferror() and fflush()) when refusing a message.
@@ -39944,7 +39944,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2006-5974</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2006-03.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2006-03.txt</url>;
     </references>
     <dates>
       <discovery>2007-01-04</discovery>
@@ -39963,7 +39963,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2006-02.txt">;
 	  <p>Fetchmail has had several longstanding password disclosure
 	    vulnerabilities.</p>
 	  <ul>
@@ -39990,7 +39990,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2006-5867</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2006-02.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2006-02.txt</url>;
     </references>
     <dates>
       <discovery>2007-01-04</discovery>
@@ -48611,7 +48611,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2006-01.txt">;
 	  <p>Fetchmail contains a bug that causes itself to crash when
 	    bouncing a message to the originator or to the local
 	    postmaster. The crash happens after the bounce message has
@@ -48623,7 +48623,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2006-0321</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2006-01.txt</url>;
       <url>http://bugs.debian.org/348747</url>;
     </references>
     <dates>
@@ -48964,7 +48964,7 @@ Note:  Please add new entries to the beg
       <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>The fetchmail team reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2005-03.txt">;
 	  <p>Fetchmail contains a bug that causes an application crash
 	    when fetchmail is configured for multidrop mode and the
 	    upstream mail server sends a message without headers.  As
@@ -48977,7 +48977,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2005-4348</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2005-03.txt</url>;
       <url>http://article.gmane.org/gmane.mail.fetchmail.user/7573</url>;
       <url>http://bugs.debian.org/343836</url>;
     </references>
@@ -50103,7 +50103,7 @@ Note:  Please add new entries to the beg
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>The fetchmail team reports:</p>
-	<blockquote cite="http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt">;
+	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2005-02.txt">;
 	  <p>The fetchmailconf program before and excluding version
 	    1.49 opened the run control file, wrote the configuration
 	    to it, and only then changed the mode to 0600 (rw-------).
@@ -50115,7 +50115,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <cvename>CVE-2005-3088</cvename>
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2005-02.txt</url>;
     </references>
     <dates>
       <discovery>2005-10-21</discovery>
@@ -52938,7 +52938,7 @@ Note:  Please add new entries to the beg
     </description>
     <references>
       <mlist msgid="20050721172317.GB3071@amilo.ms.mff.cuni.cz">http://lists.berlios.de/pipermail/fetchmail-devel/2005-July/000397.html</mlist>;
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2005-01.txt</url>;
     </references>
     <dates>
       <discovery>2005-07-21</discovery>
@@ -53031,7 +53031,7 @@ Note:  Please add new entries to the beg
       <cvename>CVE-2005-2335</cvename>
       <freebsdpr>ports/83805</freebsdpr>
       <url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=212762</url>;
-      <url>http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt</url>;
+      <url>http://www.fetchmail.info/fetchmail-SA-2005-01.txt</url>;
     </references>
     <dates>
       <discovery>2005-07-20</discovery>
@@ -71074,7 +71074,7 @@ misc.c:
   </vuln>
 
   <vuln vid="ac4b9d18-67a9-11d8-80e3-0020ed76ef5a">
-    <topic>fetchmail denial-of-service vulnerability</topic>
+    <topic>fetchmail -- denial-of-service vulnerability</topic>
     <affects>
       <package>
 	<name>fetchmail</name>
@@ -71101,7 +71101,7 @@ misc.c:
     <dates>
       <discovery>2003-10-16</discovery>
       <entry>2004-02-25</entry>
-      <modified>2004-03-05</modified>
+      <modified>2012-09-04</modified>
     </dates>
   </vuln>
 
@@ -72011,7 +72011,7 @@ misc.c:
   </vuln>
 
   <vuln vid="af0296be-2455-11d8-82e5-0020ed76ef5a">
-    <topic>Fetchmail address parsing vulnerability</topic>
+    <topic>fetchmail -- address parsing vulnerability</topic>
     <affects>
       <package>
 	<name>fetchmail</name>
@@ -72029,6 +72029,7 @@ misc.c:
     <dates>
       <discovery>2003-10-25</discovery>
       <entry>2003-10-25</entry>
+      <modified>2012-09-04</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201209042105.q84L5Flt018826>