Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 Jan 2014 21:08:46 +0000 (UTC)
From:      Bernhard Froehlich <decke@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r341451 - head/security/vuxml
Message-ID:  <201401272108.s0RL8k3B002929@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: decke
Date: Mon Jan 27 21:08:45 2014
New Revision: 341451
URL: http://svnweb.freebsd.org/changeset/ports/341451
QAT: https://qat.redports.org/buildarchive/r341451/

Log:
  - Fix style for strongswan entry
  
  Reported by:	remko

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Jan 27 20:52:51 2014	(r341450)
+++ head/security/vuxml/vuln.xml	Mon Jan 27 21:08:45 2014	(r341451)
@@ -108,18 +108,18 @@ Note:  Please add new entries to the beg
 	<p>strongSwan Project reports:</p>
 	<blockquote cite="http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6076%29.html">;
 	  <p>A DoS vulnerability triggered by crafted IKEv1 fragmentation
-	     payloads was discovered in strongSwan's IKE daemon charon. All
-	     versions since 5.0.2 are affected.</p>
+	    payloads was discovered in strongSwan's IKE daemon charon. All
+	    versions since 5.0.2 are affected.</p>
 	</blockquote>
 	<blockquote cite="http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html">;
 	  <p>A DoS vulnerability and potential authorization bypass triggered
-	     by a crafted ID_DER_ASN1_DN ID payload was discovered in strongSwan.
-	     All versions since 4.3.3 are affected.</p>
+	    by a crafted ID_DER_ASN1_DN ID payload was discovered in strongSwan.
+	    All versions since 4.3.3 are affected.</p>
 	</blockquote>
 	<blockquote cite="http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-service-vulnerability-%28cve-2013-5018%29.html">;
 	  <p>A DoS vulnerability in strongSwan was discovered, which is
-	     triggered by XAuth usernames and EAP identities in versions
-	     5.0.3 and 5.0.4.</p>
+	    triggered by XAuth usernames and EAP identities in versions
+	    5.0.3 and 5.0.4.</p>
 	</blockquote>
       </body>
     </description>
@@ -127,7 +127,9 @@ Note:  Please add new entries to the beg
       <cvename>CVE-2013-5018</cvename>
       <cvename>CVE-2013-6075</cvename>
       <cvename>CVE-2013-6076</cvename>
-      <url>http://www.strongswan.org/blog/2013/11/01/strongswan-5.1.1-released.html</url>;
+      <url>http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-service-vulnerability-%28cve-2013-5018%29.html</url>;
+      <url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html</url>;
+      <url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6076%29.html</url>;
     </references>
     <dates>
       <discovery>2013-11-01</discovery>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401272108.s0RL8k3B002929>