aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjunovitch <junovitch@FreeBSD.org>2015-09-28 10:54:41 +0800
committerjunovitch <junovitch@FreeBSD.org>2015-09-28 10:54:41 +0800
commit558cc52e5c7dc911e3db39e14900d8403e8d2de7 (patch)
tree7556ac041aeb7b17d0b326b9b6df35368acbd630 /security
parent3ae0adab261487ee4d0f80755cbf2cbc9613bd13 (diff)
downloadfreebsd-ports-gnome-558cc52e5c7dc911e3db39e14900d8403e8d2de7.tar.gz
freebsd-ports-gnome-558cc52e5c7dc911e3db39e14900d8403e8d2de7.tar.zst
freebsd-ports-gnome-558cc52e5c7dc911e3db39e14900d8403e8d2de7.zip
Fix <freebsdpr> syntax on several entries
Without ports/ prepended to the PR number, the http://www.vuxml.org links go to https://bugs.FreeBSD.org and not the actual PR. While here, "trongSwan" -> "StrongSwan" spelling correction PR: 200777
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 20 insertions, 13 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c54e4b5180e1..c066eb3bee15 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -7721,11 +7721,12 @@ Notes:
<cvename>CVE-2014-9721</cvename>
<url>https://github.com/zeromq/libzmq/issues/1273</url>
<mlist>http://www.openwall.com/lists/oss-security/2015/05/07/8</mlist>
- <freebsdpr>200502</freebsdpr>
+ <freebsdpr>ports/200502</freebsdpr>
</references>
<dates>
<discovery>2014-12-04</discovery>
<entry>2015-06-10</entry>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -7750,11 +7751,12 @@ Notes:
<cvename>CVE-2015-4054</cvename>
<url>https://pgbouncer.github.io/2015/04/pgbouncer-1-5-5/</url>
<mlist>http://www.openwall.com/lists/oss-security/2015/05/21/2</mlist>
- <freebsdpr>200507</freebsdpr>
+ <freebsdpr>ports/200507</freebsdpr>
</references>
<dates>
<discovery>2015-04-08</discovery>
<entry>2015-06-10</entry>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -7802,7 +7804,7 @@ Notes:
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>trongSwan Project reports</p>
+ <p>StrongSwan Project reports</p>
<blockquote cite="https://www.strongswan.org/blog/2015/06/01/strongswan-vulnerability-(cve-2015-3991).html">
<p>A denial-of-service and potential remote code execution vulnerability
triggered by crafted IKE messages was discovered in strongSwan. Versions
@@ -7817,6 +7819,7 @@ Notes:
<dates>
<discovery>2015-05-15</discovery>
<entry>2015-06-09</entry>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -8172,12 +8175,13 @@ Notes:
<cvename>CVE-2014-9604</cvename>
<cvename>CVE-2015-1872</cvename>
<cvename>CVE-2015-3417</cvename>
- <freebsdpr>200507</freebsdpr>
+ <freebsdpr>ports/200507</freebsdpr>
<url>http://advisories.mageia.org/MGASA-2015-0233.html</url>
</references>
<dates>
<discovery>2015-05-18</discovery>
<entry>2015-06-01</entry>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -8201,13 +8205,14 @@ Notes:
</description>
<references>
<cvename>CVE-2015-3448</cvename>
- <freebsdpr>200504</freebsdpr>
+ <freebsdpr>ports/200504</freebsdpr>
<url>https://github.com/rest-client/rest-client/issues/349</url>
<url>http://osvdb.org/show/osvdb/117461</url>
</references>
<dates>
<discovery>2015-01-12</discovery>
<entry>2015-05-31</entry>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -8231,12 +8236,13 @@ Notes:
</description>
<references>
<cvename>CVE-2015-1820</cvename>
- <freebsdpr>200504</freebsdpr>
+ <freebsdpr>ports/200504</freebsdpr>
<url>https://github.com/rest-client/rest-client/issues/369</url>
</references>
<dates>
<discovery>2015-03-24</discovery>
<entry>2015-05-31</entry>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -9203,9 +9209,9 @@ Notes:
</description>
<references>
<cvename>CVE-2015-3456</cvename>
- <freebsdpr>200255</freebsdpr>
- <freebsdpr>200256</freebsdpr>
- <freebsdpr>200257</freebsdpr>
+ <freebsdpr>ports/200255</freebsdpr>
+ <freebsdpr>ports/200256</freebsdpr>
+ <freebsdpr>ports/200257</freebsdpr>
<url>http://venom.crowdstrike.com/</url>
<url>http://www.oracle.com/technetwork/topics/security/alert-cve-2015-3456-2542656.html</url>
<url>http://xenbits.xen.org/xsa/advisory-133.html</url>
@@ -9213,7 +9219,7 @@ Notes:
<dates>
<discovery>2015-04-29</discovery>
<entry>2015-05-17</entry>
- <modified>2015-05-23</modified>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -17371,13 +17377,14 @@ Notes:
<references>
<cvename>CVE-2014-2655</cvename>
<bid>66455</bid>
- <freebsdpr>189248</freebsdpr>
+ <freebsdpr>ports/189248</freebsdpr>
<mlist>http://www.openwall.com/lists/oss-security/2014/03/26/6</mlist>
<url>https://www.debian.org/security/2014/dsa-2889</url>
</references>
<dates>
<discovery>2014-03-28</discovery>
<entry>2014-07-13</entry>
+ <modified>2015-09-28</modified>
</dates>
</vuln>
@@ -97372,7 +97379,7 @@ http_access deny Gopher</pre>
</body>
</description>
<references>
- <freebsdpr>73144</freebsdpr>
+ <freebsdpr>ports/73144</freebsdpr>
<cvename>CVE-2004-1007</cvename>
<mlist msgid="20041008143604.GA14934@scowler.net">http://article.gmane.org/gmane.mail.bogofilter.devel/3308</mlist>
<mlist msgid="m3r7o892vj.fsf@merlin.emma.line.org">http://article.gmane.org/gmane.mail.bogofilter.devel/3317</mlist>
@@ -97382,7 +97389,7 @@ http_access deny Gopher</pre>
<dates>
<discovery>2004-10-09</discovery>
<entry>2004-10-26</entry>
- <modified>2004-11-03</modified>
+ <modified>2015-09-28</modified>
</dates>
</vuln>