git: 9a6864606eff - main - security/vuxml: Fix URLs in MySQL 2023Q2 vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 22 Apr 2023 12:27:40 UTC
The branch main has been updated by brnrd: URL: https://cgit.FreeBSD.org/ports/commit/?id=9a6864606eff2abcfeba4aed003f5690a09f338f commit 9a6864606eff2abcfeba4aed003f5690a09f338f Author: Bernard Spil <brnrd@FreeBSD.org> AuthorDate: 2023-04-22 12:27:15 +0000 Commit: Bernard Spil <brnrd@FreeBSD.org> CommitDate: 2023-04-22 12:27:15 +0000 security/vuxml: Fix URLs in MySQL 2023Q2 vulnerabilities --- security/vuxml/vuln/2023.xml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index a4ab8d31fc74..7c346be72fac 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -25,7 +25,7 @@ <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Oracle reports:</p> - <blockquote cite="https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL"> + <blockquote cite="https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixMSQL"> <p>This Critical Patch Update contains 34 new security patches, plus additional third party patches noted below, for Oracle MySQL. 11 of these vulnerabilities may be remotely exploitable without @@ -61,11 +61,12 @@ <cvename>CVE-2023-21940</cvename> <cvename>CVE-2023-21947</cvename> <cvename>CVE-2023-21963</cvename> - <url>https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL</url> + <url>https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixMSQL</url> </references> <dates> <discovery>2023-04-19</discovery> <entry>2023-04-22</entry> + <modified>2023-04-22</modified> </dates> </vuln>