Author: gjb
Date: Thu Feb  5 19:31:41 2015
New Revision: 278275
URL: https://svnweb.freebsd.org/changeset/base/278275

Log:
  Add the 'security.url' macro to stable/9 and stable/8
  branches, and replace hard-coded (and inconsistent) URLs
  in security.xml and errata.xml.
  
  Prefer https:// over http://.
  
  Sponsored by: The FreeBSD Foundation

Modified:
  stable/9/release/doc/share/xml/errata.xml
  stable/9/release/doc/share/xml/release.ent
  stable/9/release/doc/share/xml/security.xml

Changes in other areas also in this revision:
Modified:
  stable/8/release/doc/share/xml/errata.xml
  stable/8/release/doc/share/xml/release.ent
  stable/8/release/doc/share/xml/security.xml

Modified: stable/9/release/doc/share/xml/errata.xml
==============================================================================
--- stable/9/release/doc/share/xml/errata.xml   Thu Feb  5 19:17:37 2015        
(r278274)
+++ stable/9/release/doc/share/xml/errata.xml   Thu Feb  5 19:31:41 2015        
(r278275)
@@ -20,14 +20,14 @@
     <tbody>
       <row>
        <entry><link
-           
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:10.tzdata.asc";>FreeBSD-EN-14:10.tzdata</link></entry>
+           
xlink:href="&security.url;/FreeBSD-EN-14:10.tzdata.asc">FreeBSD-EN-14:10.tzdata</link></entry>
        <entry>21&nbsp;October&nbsp;2014</entry>
        <entry><para>Time zone data file update</para></entry>
       </row>
 
       <row>
        <entry><link
-           
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:11.crypt.asc";>FreeBSD-EN-14:11.crypt</link></entry>
+           
xlink:href="&security.url;/FreeBSD-EN-14:11.crypt.asc">FreeBSD-EN-14:11.crypt</link></entry>
        <entry>21&nbsp;October&nbsp;2014</entry>
        <entry><para>Change &man.crypt.3; default hashing algorithm
            back to DES</para></entry>
@@ -35,7 +35,7 @@
 
       <row>
        <entry><link
-           
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:12.zfs.asc";>FreeBSD-EN-14:12.zfs</link></entry>
+           
xlink:href="&security.url;/FreeBSD-EN-14:12.zfs.asc">FreeBSD-EN-14:12.zfs</link></entry>
        <entry>11&nbsp;November&nbsp;2014</entry>
        <entry><para>Fix NFSv4 and ZFS cache consistency
            issue</para></entry>
@@ -43,7 +43,7 @@
 
       <row>
        <entry><link
-           
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-EN-14:13.freebsd-update.asc";>FreeBSD-EN-14:13.freebsd-update</link></entry>
+           
xlink:href="&security.url;/FreeBSD-EN-14:13.freebsd-update.asc">FreeBSD-EN-14:13.freebsd-update</link></entry>
        <entry>23&nbsp;December&nbsp;2014</entry>
        <entry><para>Fixed directory deletion issue in
            &man.freebsd-update.8;</para></entry>

Modified: stable/9/release/doc/share/xml/release.ent
==============================================================================
--- stable/9/release/doc/share/xml/release.ent  Thu Feb  5 19:17:37 2015        
(r278274)
+++ stable/9/release/doc/share/xml/release.ent  Thu Feb  5 19:31:41 2015        
(r278275)
@@ -20,7 +20,10 @@
 <!ENTITY release.branch "9.3-STABLE">
 
 <!-- The URL for obtaining this version of FreeBSD. -->
-<!ENTITY release.url "http://www.FreeBSD.org/releases/";>
+<!ENTITY release.url "https://www.FreeBSD.org/releases/";>
+
+<!-- The URL for Security Advisories and Errata Notices. -->
+<!ENTITY security.url "https://www.FreeBSD.org/security/advisories";>
 
 <!-- The recommended mailing list to track. -->
 <!ENTITY release.maillist "stable">
@@ -47,7 +50,7 @@
 <!ENTITY release ''>
 
 <!-- The manpaths for man page references -->
-<!ENTITY release.man.url "http://www.FreeBSD.org/cgi/man.cgi";>
+<!ENTITY release.man.url "https://www.FreeBSD.org/cgi/man.cgi";>
 <!ENTITY release.manpath.xorg          "7.5.2">
 <!ENTITY release.manpath.netbsd        "6.0">
 <!ENTITY release.manpath.freebsd-ports "Ports">

Modified: stable/9/release/doc/share/xml/security.xml
==============================================================================
--- stable/9/release/doc/share/xml/security.xml Thu Feb  5 19:17:37 2015        
(r278274)
+++ stable/9/release/doc/share/xml/security.xml Thu Feb  5 19:31:41 2015        
(r278275)
@@ -19,86 +19,86 @@
 
     <tbody>
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc";>FreeBSD-SA-14:18.openssl</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:18.openssl.asc">FreeBSD-SA-14:18.openssl</link></entry>
        <entry>9&nbsp;September&nbsp;2014</entry>
        <entry><para>Multiple vulnerabilities</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc";>FreeBSD-SA-14:19.tcp</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:19.tcp.asc">FreeBSD-SA-14:19.tcp</link></entry>
        <entry>16&nbsp;September&nbsp;2014</entry>
        <entry><para>Denial of Service in TCP packet
            processing.</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc";>FreeBSD-SA-14:20.rtsold</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:20.rtsold.asc">FreeBSD-SA-14:20.rtsold</link></entry>
        <entry>21&nbsp;October&nbsp;2014</entry>
        <entry><para>Remote buffer overflow
            vulnerability.</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc";>FreeBSD-SA-14:21.routed</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:21.routed.asc">FreeBSD-SA-14:21.routed</link></entry>
        <entry>21&nbsp;October&nbsp;2014</entry>
        <entry><para>Remote denial of service
            vulnerability.</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:22.namei.asc";>FreeBSD-SA-14:22.namei</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:22.namei.asc">FreeBSD-SA-14:22.namei</link></entry>
        <entry>21&nbsp;October&nbsp;2014</entry>
        <entry><para>Memory leak in sandboxed namei
            lookup.</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:23.openssl.asc";>FreeBSD-SA-14:23.openssl</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:23.openssl.asc">FreeBSD-SA-14:23.openssl</link></entry>
        <entry>21&nbsp;October&nbsp;2014</entry>
        <entry><para>Multiple vulerabilities.</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:25.setlogin.asc";>FreeBSD-SA-14:25.setlogin</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:25.setlogin.asc">FreeBSD-SA-14:25.setlogin</link></entry>
        <entry>04&nbsp;November&nbsp;2014</entry>
        <entry><para>Kernel stack disclosure.</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:26.ftp.asc";>FreeBSD-SA-14:26.ftp</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:26.ftp.asc">FreeBSD-SA-14:26.ftp</link></entry>
        <entry>04&nbsp;November&nbsp;2014</entry>
        <entry><para>Remote code execution.</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc";>FreeBSD-SA-14:28.file</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:28.file.asc">FreeBSD-SA-14:28.file</link></entry>
        <entry>10&nbsp;December&nbsp;2014</entry>
        <entry><para>Multiple vulnerabilities in &man.file.1; and
            &man.libmagic.3;</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:29.bind.asc";>FreeBSD-SA-14:29.bind</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:29.bind.asc">FreeBSD-SA-14:29.bind</link></entry>
        <entry>10&nbsp;December&nbsp;2014</entry>
        <entry><para>Remote denial of service
            vulnerability</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:31.ntp.asc";>FreeBSD-SA-14:31.ntp</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-14:31.ntp.asc">FreeBSD-SA-14:31.ntp</link></entry>
        <entry>23&nbsp;December&nbsp;2014</entry>
        <entry><para>Multiple vulnerabilities</para></entry>
       </row>
 
       <row>
-       <entry><link 
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:01.openssl.asc";>FreeBSD-SA-15:01.openssl</link></entry>
+       <entry><link 
xlink:href="&security.url;/FreeBSD-SA-15:01.openssl.asc">FreeBSD-SA-15:01.openssl</link></entry>
        <entry>14&nbsp;January&nbsp;2015</entry>
        <entry><para>Multiple vulnerabilities</para></entry>
       </row>
 
       <row>
        <entry><link
-           
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:02.kmem.asc";>FreeBSD-SA-15:02.kmem</link></entry>
+           
xlink:href="&security.url;/FreeBSD-SA-15:02.kmem.asc">FreeBSD-SA-15:02.kmem</link></entry>
        <entry>27&nbsp;January&nbsp;2015</entry>
        <entry><para>SCTP kernel memory corruption and
            disclosure vulnerability</para></entry>
@@ -106,7 +106,7 @@
 
       <row>
        <entry><link
-           
xlink:href="http://www.freebsd.org/security/advisories/FreeBSD-SA-15:03.sctp.asc";>FreeBSD-SA-15:03.sctp</link></entry>
+           
xlink:href="&security.url;/FreeBSD-SA-15:03.sctp.asc">FreeBSD-SA-15:03.sctp</link></entry>
        <entry>27&nbsp;January&nbsp;2015</entry>
        <entry><para>SCTP stream reset
            vulnerability</para></entry>
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "[email protected]"

Reply via email to