From owner-svn-ports-head@freebsd.org Mon Sep 28 02:54:42 2015 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 29BE1A0B8CF; Mon, 28 Sep 2015 02:54:42 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0DF4BA4D; Mon, 28 Sep 2015 02:54:42 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.70]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id t8S2sfwd028116; Mon, 28 Sep 2015 02:54:41 GMT (envelope-from junovitch@FreeBSD.org) Received: (from junovitch@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id t8S2sfNS028115; Mon, 28 Sep 2015 02:54:41 GMT (envelope-from junovitch@FreeBSD.org) Message-Id: <201509280254.t8S2sfNS028115@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: junovitch set sender to junovitch@FreeBSD.org using -f From: Jason Unovitch Date: Mon, 28 Sep 2015 02:54:41 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r398071 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Sep 2015 02:54:42 -0000 Author: junovitch Date: Mon Sep 28 02:54:41 2015 New Revision: 398071 URL: https://svnweb.freebsd.org/changeset/ports/398071 Log: Fix syntax on several entries Without ports/ prepended to the PR number, the http://www.vuxml.org links go to https://bugs.FreeBSD.org and not the actual PR. While here, "trongSwan" -> "StrongSwan" spelling correction PR: 200777 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Sep 28 01:43:57 2015 (r398070) +++ head/security/vuxml/vuln.xml Mon Sep 28 02:54:41 2015 (r398071) @@ -7721,11 +7721,12 @@ Notes: CVE-2014-9721 https://github.com/zeromq/libzmq/issues/1273 http://www.openwall.com/lists/oss-security/2015/05/07/8 - 200502 + ports/200502 2014-12-04 2015-06-10 + 2015-09-28 @@ -7750,11 +7751,12 @@ Notes: CVE-2015-4054 https://pgbouncer.github.io/2015/04/pgbouncer-1-5-5/ http://www.openwall.com/lists/oss-security/2015/05/21/2 - 200507 + ports/200507 2015-04-08 2015-06-10 + 2015-09-28 @@ -7802,7 +7804,7 @@ Notes: -

trongSwan Project reports

+

StrongSwan Project reports

A denial-of-service and potential remote code execution vulnerability triggered by crafted IKE messages was discovered in strongSwan. Versions @@ -7817,6 +7819,7 @@ Notes: 2015-05-15 2015-06-09 + 2015-09-28 @@ -8172,12 +8175,13 @@ Notes: CVE-2014-9604 CVE-2015-1872 CVE-2015-3417 - 200507 + ports/200507 http://advisories.mageia.org/MGASA-2015-0233.html 2015-05-18 2015-06-01 + 2015-09-28 @@ -8201,13 +8205,14 @@ Notes: CVE-2015-3448 - 200504 + ports/200504 https://github.com/rest-client/rest-client/issues/349 http://osvdb.org/show/osvdb/117461 2015-01-12 2015-05-31 + 2015-09-28 @@ -8231,12 +8236,13 @@ Notes: CVE-2015-1820 - 200504 + ports/200504 https://github.com/rest-client/rest-client/issues/369 2015-03-24 2015-05-31 + 2015-09-28 @@ -9203,9 +9209,9 @@ Notes: CVE-2015-3456 - 200255 - 200256 - 200257 + ports/200255 + ports/200256 + ports/200257 http://venom.crowdstrike.com/ http://www.oracle.com/technetwork/topics/security/alert-cve-2015-3456-2542656.html http://xenbits.xen.org/xsa/advisory-133.html @@ -9213,7 +9219,7 @@ Notes: 2015-04-29 2015-05-17 - 2015-05-23 + 2015-09-28 @@ -17371,13 +17377,14 @@ Notes: CVE-2014-2655 66455 - 189248 + ports/189248 http://www.openwall.com/lists/oss-security/2014/03/26/6 https://www.debian.org/security/2014/dsa-2889 2014-03-28 2014-07-13 + 2015-09-28 @@ -97372,7 +97379,7 @@ http_access deny Gopher - 73144 + ports/73144 CVE-2004-1007 http://article.gmane.org/gmane.mail.bogofilter.devel/3308 http://article.gmane.org/gmane.mail.bogofilter.devel/3317 @@ -97382,7 +97389,7 @@ http_access deny Gopher 2004-10-09 2004-10-26 - 2004-11-03 + 2015-09-28