svn commit: r278275 - in stable: 8/release/doc/share/xml 9/release/doc/share/xml
Glen Barber
gjb at FreeBSD.org
Thu Feb 5 19:31:44 UTC 2015
Author: gjb
Date: Thu Feb 5 19:31:41 2015
New Revision: 278275
URL: https://svnweb.freebsd.org/changeset/base/278275
Log:
Add the 'security.url' macro to stable/9 and stable/8
branches, and replace hard-coded (and inconsistent) URLs
in security.xml and errata.xml.
Prefer https:// over http://.
Sponsored by: The FreeBSD Foundation
Modified:
stable/9/release/doc/share/xml/errata.xml
stable/9/release/doc/share/xml/release.ent
stable/9/release/doc/share/xml/security.xml
Changes in other areas also in this revision:
Modified:
stable/8/release/doc/share/xml/errata.xml
stable/8/release/doc/share/xml/release.ent
stable/8/release/doc/share/xml/security.xml
Modified: stable/9/release/doc/share/xml/errata.xml
==============================================================================
--- stable/9/release/doc/share/xml/errata.xml Thu Feb 5 19:17:37 2015 (r278274)
+++ stable/9/release/doc/share/xml/errata.xml Thu Feb 5 19:31:41 2015 (r278275)
@@ -20,14 +20,14 @@
<tbody>
<row>
<entry><link
- xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc">FreeBSD-EN-14:10.tzdata</link></entry>
+ xlink:href="&security.url;/FreeBSD-EN-14:10.tzdata.asc">FreeBSD-EN-14:10.tzdata</link></entry>
<entry>21 October 2014</entry>
<entry><para>Time zone data file update</para></entry>
</row>
<row>
<entry><link
- xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:11.crypt.asc">FreeBSD-EN-14:11.crypt</link></entry>
+ xlink:href="&security.url;/FreeBSD-EN-14:11.crypt.asc">FreeBSD-EN-14:11.crypt</link></entry>
<entry>21 October 2014</entry>
<entry><para>Change &man.crypt.3; default hashing algorithm
back to DES</para></entry>
@@ -35,7 +35,7 @@
<row>
<entry><link
- xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:12.zfs.asc">FreeBSD-EN-14:12.zfs</link></entry>
+ xlink:href="&security.url;/FreeBSD-EN-14:12.zfs.asc">FreeBSD-EN-14:12.zfs</link></entry>
<entry>11 November 2014</entry>
<entry><para>Fix NFSv4 and ZFS cache consistency
issue</para></entry>
@@ -43,7 +43,7 @@
<row>
<entry><link
- xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc">FreeBSD-EN-14:13.freebsd-update</link></entry>
+ xlink:href="&security.url;/FreeBSD-EN-14:13.freebsd-update.asc">FreeBSD-EN-14:13.freebsd-update</link></entry>
<entry>23 December 2014</entry>
<entry><para>Fixed directory deletion issue in
&man.freebsd-update.8;</para></entry>
Modified: stable/9/release/doc/share/xml/release.ent
==============================================================================
--- stable/9/release/doc/share/xml/release.ent Thu Feb 5 19:17:37 2015 (r278274)
+++ stable/9/release/doc/share/xml/release.ent Thu Feb 5 19:31:41 2015 (r278275)
@@ -20,7 +20,10 @@
<!ENTITY release.branch "9.3-STABLE">
<!-- The URL for obtaining this version of FreeBSD. -->
-<!ENTITY release.url "http://www.FreeBSD.org/releases/">
+<!ENTITY release.url "https://www.FreeBSD.org/releases/">
+
+<!-- The URL for Security Advisories and Errata Notices. -->
+<!ENTITY security.url "https://www.FreeBSD.org/security/advisories">
<!-- The recommended mailing list to track. -->
<!ENTITY release.maillist "stable">
@@ -47,7 +50,7 @@
<!ENTITY release ''>
<!-- The manpaths for man page references -->
-<!ENTITY release.man.url "http://www.FreeBSD.org/cgi/man.cgi">
+<!ENTITY release.man.url "https://www.FreeBSD.org/cgi/man.cgi">
<!ENTITY release.manpath.xorg "7.5.2">
<!ENTITY release.manpath.netbsd "6.0">
<!ENTITY release.manpath.freebsd-ports "Ports">
Modified: stable/9/release/doc/share/xml/security.xml
==============================================================================
--- stable/9/release/doc/share/xml/security.xml Thu Feb 5 19:17:37 2015 (r278274)
+++ stable/9/release/doc/share/xml/security.xml Thu Feb 5 19:31:41 2015 (r278275)
@@ -19,86 +19,86 @@
<tbody>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc">FreeBSD-SA-14:18.openssl</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:18.openssl.asc">FreeBSD-SA-14:18.openssl</link></entry>
<entry>9 September 2014</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc">FreeBSD-SA-14:19.tcp</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:19.tcp.asc">FreeBSD-SA-14:19.tcp</link></entry>
<entry>16 September 2014</entry>
<entry><para>Denial of Service in TCP packet
processing.</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc">FreeBSD-SA-14:20.rtsold</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:20.rtsold.asc">FreeBSD-SA-14:20.rtsold</link></entry>
<entry>21 October 2014</entry>
<entry><para>Remote buffer overflow
vulnerability.</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc">FreeBSD-SA-14:21.routed</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:21.routed.asc">FreeBSD-SA-14:21.routed</link></entry>
<entry>21 October 2014</entry>
<entry><para>Remote denial of service
vulnerability.</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:22.namei.asc">FreeBSD-SA-14:22.namei</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:22.namei.asc">FreeBSD-SA-14:22.namei</link></entry>
<entry>21 October 2014</entry>
<entry><para>Memory leak in sandboxed namei
lookup.</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:23.openssl.asc">FreeBSD-SA-14:23.openssl</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:23.openssl.asc">FreeBSD-SA-14:23.openssl</link></entry>
<entry>21 October 2014</entry>
<entry><para>Multiple vulerabilities.</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc">FreeBSD-SA-14:25.setlogin</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:25.setlogin.asc">FreeBSD-SA-14:25.setlogin</link></entry>
<entry>04 November 2014</entry>
<entry><para>Kernel stack disclosure.</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:26.ftp.asc">FreeBSD-SA-14:26.ftp</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:26.ftp.asc">FreeBSD-SA-14:26.ftp</link></entry>
<entry>04 November 2014</entry>
<entry><para>Remote code execution.</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc">FreeBSD-SA-14:28.file</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:28.file.asc">FreeBSD-SA-14:28.file</link></entry>
<entry>10 December 2014</entry>
<entry><para>Multiple vulnerabilities in &man.file.1; and
&man.libmagic.3;</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:29.bind.asc">FreeBSD-SA-14:29.bind</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:29.bind.asc">FreeBSD-SA-14:29.bind</link></entry>
<entry>10 December 2014</entry>
<entry><para>Remote denial of service
vulnerability</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:31.ntp.asc">FreeBSD-SA-14:31.ntp</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-14:31.ntp.asc">FreeBSD-SA-14:31.ntp</link></entry>
<entry>23 December 2014</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
- <entry><link xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:01.openssl.asc">FreeBSD-SA-15:01.openssl</link></entry>
+ <entry><link xlink:href="&security.url;/FreeBSD-SA-15:01.openssl.asc">FreeBSD-SA-15:01.openssl</link></entry>
<entry>14 January 2015</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
- xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:02.kmem.asc">FreeBSD-SA-15:02.kmem</link></entry>
+ xlink:href="&security.url;/FreeBSD-SA-15:02.kmem.asc">FreeBSD-SA-15:02.kmem</link></entry>
<entry>27 January 2015</entry>
<entry><para>SCTP kernel memory corruption and
disclosure vulnerability</para></entry>
@@ -106,7 +106,7 @@
<row>
<entry><link
- xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:03.sctp.asc">FreeBSD-SA-15:03.sctp</link></entry>
+ xlink:href="&security.url;/FreeBSD-SA-15:03.sctp.asc">FreeBSD-SA-15:03.sctp</link></entry>
<entry>27 January 2015</entry>
<entry><para>SCTP stream reset
vulnerability</para></entry>
More information about the svn-src-stable-9
mailing list