Bug 256374 - inform users via security/vuxml about the recent sogo vulnerability
Summary: inform users via security/vuxml about the recent sogo vulnerability
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: Thomas Zander
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-06-02 11:56 UTC by rob2g2
Modified: 2021-06-04 10:01 UTC (History)
5 users (show)

See Also:
riggs: maintainer-feedback+


Attachments
vuxml entry (1.50 KB, patch)
2021-06-02 11:58 UTC, rob2g2
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description rob2g2 2021-06-02 11:56:42 UTC
inform users via vuxml about CVE-2021-33054
Comment 1 rob2g2 2021-06-02 11:58:05 UTC
Created attachment 225495 [details]
vuxml entry
Comment 2 commit-hook freebsd_committer 2021-06-04 10:01:47 UTC
A commit in branch main references this bug:

URL: https://cgit.FreeBSD.org/ports/commit/?id=44ca7573855d48957714ccbe1e0849617ac18915

commit 44ca7573855d48957714ccbe1e0849617ac18915
Author:     Thomas Zander <riggs@FreeBSD.org>
AuthorDate: 2021-06-04 09:59:47 +0000
Commit:     Thomas Zander <riggs@FreeBSD.org>
CommitDate: 2021-06-04 09:59:47 +0000

    security/vuxml: Document CVE-2021-33054 for www/sogo*.

    PR:             256374
    Reported by:    rob2g2 <spam123@bitbert.com>

 security/vuxml/vuln.xml | 41 +++++++++++++++++++++++++++++++++++++++++
 1 file changed, 41 insertions(+)