J. Random Hacker reports:
<.>Several issues in the Foo software may be exploited via carefully crafted QUUX requests. These requests will permit the injection of Bar code, mumble theft, and the readability of the Foo administrator account.
` and `
` has to appear. More complex mark-up may be used, but only for the sake of accuracy and clarity: No eye candy please. <.> This section contains references to relevant documents. As many references as apply are encouraged. <.> This is a https://www.freebsd.org/security/#adv[FreeBSD security advisory]. <.> This is a https://www.freebsd.org/support/[FreeBSD problem report]. <.> This is a https://cve.mitre.org/[MITRE CVE] identifier. -<.> This is a https://www.kb.cert.org/vuls/[US-CERT] vulnerability note. +<.> This is a https://www.securityfocus.com/bid/[SecurityFocus Bug ID]. -<.> This is a https://www.cisa.gov/news-events/cybersecurity-advisories[US-CERT] Technical Cyber Security Alert. +<.> This is a https://www.cert.org/[US-CERT] security advisory. + +<.> This is a https://www.cert.org/[US-CERT] vulnerability note. + +<.> This is a https://www.cert.org/[US-CERT] Cyber Security Alert. + +<.> This is a https://www.cert.org/[US-CERT] Technical Cyber Security Alert. <.> This is a URL to an archived posting in a mailing list. The attribute `msgid` is optional and may specify the message ID of the posting. <.> This is a generic URL. Only it if none of the other reference categories apply. <.> This is the date when the issue was disclosed (_YYYY-MM-DD_). <.> This is the date when the entry was added (_YYYY-MM-DD_). <.> This is the date when any information in the entry was last modified (_YYYY-MM-DD_). New entries must not include this field. Add it when editing an existing entry. [[security-notify-vuxml-testing]] === Testing Changes to the VuXML Database This example describes a new entry for a vulnerability in the package `dropbear` that has been fixed in version `dropbear-2013.59`. As a prerequisite, install a fresh version of package:security/vuxml[] port. First, check whether there already is an entry for this vulnerability. If there were such an entry, it would match the previous version of the package, `2013.58`: [source,shell] .... % pkg audit dropbear-2013.58 .... If there is none found, add a new entry for this vulnerability. [source,shell] .... % cd ${PORTSDIR}/security/vuxml % make newentry .... If the vulnerability has a https://cve.mitre.org/[MITRE CVE] identifier, the following command can be used instead: [source,shell] .... % cd ${PORTSDIR}/security/vuxml % make newentry CVE_ID=CVE-YYYY-XXXXX .... where `CVE-YYYYY-XXXX` is a valid CVE identifier. If the vulnerability is a FreeBSD Security Advisory, the following command can be used instead: [source,shell] .... % cd ${PORTSDIR}/security/vuxml % make newentry SA_ID=FreeBSD-SA-YY-XXXXXX.asc .... where `FreeBSD-SA-YY-XXXXXX.asc` is a published https://www.freebsd.org/security/advisories/[FreeBSD Security Advisory]. Verify its syntax and formatting: [source,shell] .... % make validate .... The previous command generates the [.filename]#vuln-flat.xml# file. It can also be generated with: [source,shell] .... % make vuln-flat.xml .... [NOTE] ==== At least one of these packages needs to be installed: package:textproc/libxml2[], package:textproc/jade[]. ==== Verify that the `