Date: Mon, 27 Jan 2014 22:27:35 +0100 From: Remko Lodder <remko@FreeBSD.org> To: Bernhard Froehlich <decke@FreeBSD.org> Cc: svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org Subject: Re: svn commit: r341451 - head/security/vuxml Message-ID: <BE1DFFBE-088B-40A9-82F4-7CC01C9B3955@FreeBSD.org> In-Reply-To: <201401272108.s0RL8k3B002929@svn.freebsd.org> References: <201401272108.s0RL8k3B002929@svn.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii On 27 Jan 2014, at 22:08, Bernhard Froehlich <decke@FreeBSD.org> wrote: > Author: decke > Date: Mon Jan 27 21:08:45 2014 > New Revision: 341451 > URL: http://svnweb.freebsd.org/changeset/ports/341451 > QAT: https://qat.redports.org/buildarchive/r341451/ >=20 > Log: > - Fix style for strongswan entry >=20 > Reported by: remko Thank you!! :) >=20 > Modified: > head/security/vuxml/vuln.xml >=20 > Modified: head/security/vuxml/vuln.xml > = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D > --- head/security/vuxml/vuln.xml Mon Jan 27 20:52:51 2014 = (r341450) > +++ head/security/vuxml/vuln.xml Mon Jan 27 21:08:45 2014 = (r341451) > @@ -108,18 +108,18 @@ Note: Please add new entries to the beg > <p>strongSwan Project reports:</p> > <blockquote = cite=3D"http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-ser= vice-vulnerability-%28cve-2013-6076%29.html"> > <p>A DoS vulnerability triggered by crafted IKEv1 = fragmentation > - payloads was discovered in strongSwan's IKE daemon charon. = All > - versions since 5.0.2 are affected.</p> > + payloads was discovered in strongSwan's IKE daemon charon. = All > + versions since 5.0.2 are affected.</p> > </blockquote> > <blockquote = cite=3D"http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-ser= vice-vulnerability-%28cve-2013-6075%29.html"> > <p>A DoS vulnerability and potential authorization bypass = triggered > - by a crafted ID_DER_ASN1_DN ID payload was discovered in = strongSwan. > - All versions since 4.3.3 are affected.</p> > + by a crafted ID_DER_ASN1_DN ID payload was discovered in = strongSwan. > + All versions since 4.3.3 are affected.</p> > </blockquote> > <blockquote = cite=3D"http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-ser= vice-vulnerability-%28cve-2013-5018%29.html"> > <p>A DoS vulnerability in strongSwan was discovered, which is > - triggered by XAuth usernames and EAP identities in versions > - 5.0.3 and 5.0.4.</p> > + triggered by XAuth usernames and EAP identities in versions > + 5.0.3 and 5.0.4.</p> > </blockquote> > </body> > </description> > @@ -127,7 +127,9 @@ Note: Please add new entries to the beg > <cvename>CVE-2013-5018</cvename> > <cvename>CVE-2013-6075</cvename> > <cvename>CVE-2013-6076</cvename> > - = <url>http://www.strongswan.org/blog/2013/11/01/strongswan-5.1.1-released.h= tml</url> > + = <url>http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-servic= e-vulnerability-%28cve-2013-5018%29.html</url> > + = <url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-servic= e-vulnerability-%28cve-2013-6075%29.html</url> > + = <url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-servic= e-vulnerability-%28cve-2013-6076%29.html</url> > </references> > <dates> > <discovery>2013-11-01</discovery> > _______________________________________________ > svn-ports-all@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/svn-ports-all > To unsubscribe, send any mail to = "svn-ports-all-unsubscribe@freebsd.org" --=20 /"\ Best regards, | remko@FreeBSD.org \ / Remko Lodder | remko@EFnet X http://www.evilcoder.org/ | / \ ASCII Ribbon Campaign | Against HTML Mail and News --Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJS5s9HAAoJEKjD27JZ84ywbg4P/j5s+a8tTmoojan9o3D5Tmbo hV2ZqQ09111rRdP33JFZ6kT7Vg8BT1NxR0w5ZUTOcKY1z+jKnO/P+pPLm4abx0JS HLsSa1SppSRCVFocw5AVTUfkG7j+hKugAV4gH4rv3O7X4hlG7ut/uL06UQ9GeI0e 27HDsgsr7Oksk6bKNYvxHz6uiCanZ/Eqc1iBgrBceWFSxzIKzOBBPU/D38xGPoEn UsdIp6FPPfiaSb3yVnK135aa1RsekgDnoNcgE/fHCjZ4tcv2ct6LlvprSduI9mP0 RY4gEn+Nxtc9Xis4Phw9KUN5Bnq0VXZeTaONMVeQig02ju5MENq/0KlMspiyDNvM mUDGSyn+8Z6vvolYREbqGB44P3+PK9FPJhguDnPEP1cyjIXQ4mFFhFEmEVB87Zwd Xfp4WfHtmgx9RPPjRvLAnEYxEIDzLpSPNxHhA7vzkk4vA1MUG8p7SsZhpLrI0KC2 ES9bJHuEdV8myui7B66w8Thsfld4gpGrnl5vC4D+z3j0lWlLh67EDtGTttGv/w1g +yuNO2ye+lBumJFrQb0vZF2YjX9uvpeAqd4qyD2PDcE1kZYyUBlGbH2kC+wDXJ5Q vFBHRZyec9c094X7wNOxCk5zvA7nGwZsRhQEugqw1NBao51kw6rQl8LVf3jXgzBM NrQKnTDYDIhY9yZxQiL4 =W6bS -----END PGP SIGNATURE----- --Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?BE1DFFBE-088B-40A9-82F4-7CC01C9B3955>