Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 Jan 2014 22:27:35 +0100
From:      Remko Lodder <remko@FreeBSD.org>
To:        Bernhard Froehlich <decke@FreeBSD.org>
Cc:        svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org
Subject:   Re: svn commit: r341451 - head/security/vuxml
Message-ID:  <BE1DFFBE-088B-40A9-82F4-7CC01C9B3955@FreeBSD.org>
In-Reply-To: <201401272108.s0RL8k3B002929@svn.freebsd.org>
References:  <201401272108.s0RL8k3B002929@svn.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On 27 Jan 2014, at 22:08, Bernhard Froehlich <decke@FreeBSD.org> wrote:

> Author: decke
> Date: Mon Jan 27 21:08:45 2014
> New Revision: 341451
> URL: http://svnweb.freebsd.org/changeset/ports/341451
> QAT: https://qat.redports.org/buildarchive/r341451/
>=20
> Log:
>  - Fix style for strongswan entry
>=20
>  Reported by:	remko

Thank you!! :)

>=20
> Modified:
>  head/security/vuxml/vuln.xml
>=20
> Modified: head/security/vuxml/vuln.xml
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
> --- head/security/vuxml/vuln.xml	Mon Jan 27 20:52:51 2014	=
(r341450)
> +++ head/security/vuxml/vuln.xml	Mon Jan 27 21:08:45 2014	=
(r341451)
> @@ -108,18 +108,18 @@ Note:  Please add new entries to the beg
> 	<p>strongSwan Project reports:</p>
> 	<blockquote =
cite=3D"http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-ser=
vice-vulnerability-%28cve-2013-6076%29.html">
> 	  <p>A DoS vulnerability triggered by crafted IKEv1 =
fragmentation
> -	     payloads was discovered in strongSwan's IKE daemon charon. =
All
> -	     versions since 5.0.2 are affected.</p>
> +	    payloads was discovered in strongSwan's IKE daemon charon. =
All
> +	    versions since 5.0.2 are affected.</p>
> 	</blockquote>
> 	<blockquote =
cite=3D"http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-ser=
vice-vulnerability-%28cve-2013-6075%29.html">
> 	  <p>A DoS vulnerability and potential authorization bypass =
triggered
> -	     by a crafted ID_DER_ASN1_DN ID payload was discovered in =
strongSwan.
> -	     All versions since 4.3.3 are affected.</p>
> +	    by a crafted ID_DER_ASN1_DN ID payload was discovered in =
strongSwan.
> +	    All versions since 4.3.3 are affected.</p>
> 	</blockquote>
> 	<blockquote =
cite=3D"http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-ser=
vice-vulnerability-%28cve-2013-5018%29.html">
> 	  <p>A DoS vulnerability in strongSwan was discovered, which is
> -	     triggered by XAuth usernames and EAP identities in versions
> -	     5.0.3 and 5.0.4.</p>
> +	    triggered by XAuth usernames and EAP identities in versions
> +	    5.0.3 and 5.0.4.</p>
> 	</blockquote>
>       </body>
>     </description>
> @@ -127,7 +127,9 @@ Note:  Please add new entries to the beg
>       <cvename>CVE-2013-5018</cvename>
>       <cvename>CVE-2013-6075</cvename>
>       <cvename>CVE-2013-6076</cvename>
> -      =
<url>http://www.strongswan.org/blog/2013/11/01/strongswan-5.1.1-released.h=
tml</url>
> +      =
<url>http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-servic=
e-vulnerability-%28cve-2013-5018%29.html</url>
> +      =
<url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-servic=
e-vulnerability-%28cve-2013-6075%29.html</url>
> +      =
<url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-servic=
e-vulnerability-%28cve-2013-6076%29.html</url>
>     </references>
>     <dates>
>       <discovery>2013-11-01</discovery>
> _______________________________________________
> svn-ports-all@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/svn-ports-all
> To unsubscribe, send any mail to =
"svn-ports-all-unsubscribe@freebsd.org"

--=20

/"\   Best regards,                      | remko@FreeBSD.org
\ /   Remko Lodder                       | remko@EFnet
 X    http://www.evilcoder.org/          |
/ \   ASCII Ribbon Campaign              | Against HTML Mail and News


--Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=W6bS
-----END PGP SIGNATURE-----

--Apple-Mail=_5115A8DA-5D61-43BF-8FFA-455C35512B39--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?BE1DFFBE-088B-40A9-82F4-7CC01C9B3955>