Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 5 Feb 2015 14:12:05 +0000 (UTC)
From:      Glen Barber <gjb@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-10@freebsd.org
Subject:   svn commit: r278263 - in stable/10/release/doc: en_US.ISO8859-1/relnotes share/xml
Message-ID:  <201502051412.t15EC5TG045387@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: gjb
Date: Thu Feb  5 14:12:05 2015
New Revision: 278263
URL: https://svnweb.freebsd.org/changeset/base/278263

Log:
  Add an entity to use to link to SAs and ENs.
  Update the Security Advisories and Errata Notices
  section to use the new entity.
  Prefer https:// for other URLs.
  
  Sponsored by:	The FreeBSD Foundation

Modified:
  stable/10/release/doc/en_US.ISO8859-1/relnotes/article.xml
  stable/10/release/doc/share/xml/release.ent

Modified: stable/10/release/doc/en_US.ISO8859-1/relnotes/article.xml
==============================================================================
--- stable/10/release/doc/en_US.ISO8859-1/relnotes/article.xml	Thu Feb  5 14:08:57 2015	(r278262)
+++ stable/10/release/doc/en_US.ISO8859-1/relnotes/article.xml	Thu Feb  5 14:12:05 2015	(r278263)
@@ -154,14 +154,14 @@
 	  <tbody>
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:27.stdio.asc">FreeBSD-SA-14:27.stdio</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-SA-14:27.stdio.asc">FreeBSD-SA-14:27.stdio</link></entry>
 	      <entry>10&nbsp;December&nbsp;2014</entry>
 	      <entry><para>Buffer overflow in stdio</para></entry>
 	    </row>
 
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc">FreeBSD-SA-14:28.file</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-SA-14:28.file.asc">FreeBSD-SA-14:28.file</link></entry>
 	      <entry>10&nbsp;December&nbsp;2014</entry>
 	      <entry><para>Multiple vulnerabilities in &man.file.1;
 		and &man.libmagic.3;</para></entry>
@@ -169,7 +169,7 @@
 
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:30.unbound.asc">FreeBSD-SA-14:30.unbound</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-SA-14:30.unbound.asc">FreeBSD-SA-14:30.unbound</link></entry>
 	      <entry>17&nbsp;December&nbsp;2014</entry>
 	      <entry><para>Remote denial of service
 		vulnerability</para></entry>
@@ -177,7 +177,7 @@
 
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:31.ntp.asc">FreeBSD-SA-14:31.ntp</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-SA-14:31.ntp.asc">FreeBSD-SA-14:31.ntp</link></entry>
 	      <entry>23&nbsp;December&nbsp;2014</entry>
 	      <entry><para>Multiple vulnerabilities in NTP
 		suite</para></entry>
@@ -185,7 +185,7 @@
 
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:01.openssl.asc">FreeBSD-SA-15:01.openssl</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-SA-15:01.openssl.asc">FreeBSD-SA-15:01.openssl</link></entry>
 	      <entry>14&nbsp;January&nbsp;2015</entry>
 	      <entry><para>Multiple vulnerabilities in
 		OpenSSL</para></entry>
@@ -193,7 +193,7 @@
 
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:02.kmem.asc">FreeBSD-SA-15:02.kmem</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-SA-15:02.kmem.asc">FreeBSD-SA-15:02.kmem</link></entry>
 	      <entry>27&nbsp;January&nbsp;2015</entry>
 	      <entry><para>SCTP kernel memory corruption and
 		disclosure vulnerability</para></entry>
@@ -201,7 +201,7 @@
 
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:03.sctp.asc">FreeBSD-SA-15:03.sctp</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-SA-15:03.sctp.asc">FreeBSD-SA-15:03.sctp</link></entry>
 	      <entry>27&nbsp;January&nbsp;2015</entry>
 	      <entry><para>SCTP stream reset
 		vulnerability</para></entry>
@@ -230,7 +230,7 @@
 	  <tbody>
 	    <row>
 	      <entry><link
-		  xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc">FreeBSD-EN-14:13.freebsd-update</link></entry>;
+		  xlink:href="&security.url;/FreeBSD-EN-14:13.freebsd-update.asc">FreeBSD-EN-14:13.freebsd-update</link></entry>
 	      <entry>23&nbsp;December&nbsp;2014</entry>
 	      <entry><para>Fixed directory deletion issue in
 		&man.freebsd-update.8;</para></entry>

Modified: stable/10/release/doc/share/xml/release.ent
==============================================================================
--- stable/10/release/doc/share/xml/release.ent	Thu Feb  5 14:08:57 2015	(r278262)
+++ stable/10/release/doc/share/xml/release.ent	Thu Feb  5 14:12:05 2015	(r278263)
@@ -25,7 +25,10 @@
 <!ENTITY release.branch "10.1-STABLE">
 
 <!-- The URL for obtaining this version of FreeBSD. -->
-<!ENTITY release.url "http://www.FreeBSD.org/snapshots/">;
+<!ENTITY release.url "https://www.FreeBSD.org/snapshots/">;
+
+<!-- The URL for Security Advisories and Errata Notices. -->
+<!ENTITY security.url "https://www.FreeBSD.org/security/advisories">;
 
 <!-- The recommended mailing list to track. -->
 <!ENTITY release.maillist "stable">
@@ -51,7 +54,7 @@
 <!ENTITY release ''>
 
 <!-- The manpaths for man page references -->
-<!ENTITY release.man.url "http://www.FreeBSD.org/cgi/man.cgi">;
+<!ENTITY release.man.url "https://www.FreeBSD.org/cgi/man.cgi">;
 <!ENTITY release.manpath.xorg          "7.5.1">
 <!ENTITY release.manpath.netbsd        "5.1">
 <!ENTITY release.manpath.freebsd-ports "Ports">



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502051412.t15EC5TG045387>