git: 9a6864606eff - main - security/vuxml: Fix URLs in MySQL 2023Q2 vulnerabilities

From: Bernard Spil <brnrd_at_FreeBSD.org>
Date: Sat, 22 Apr 2023 12:27:40 UTC
The branch main has been updated by brnrd:

URL: https://cgit.FreeBSD.org/ports/commit/?id=9a6864606eff2abcfeba4aed003f5690a09f338f

commit 9a6864606eff2abcfeba4aed003f5690a09f338f
Author:     Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2023-04-22 12:27:15 +0000
Commit:     Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2023-04-22 12:27:15 +0000

    security/vuxml: Fix URLs in MySQL 2023Q2 vulnerabilities
---
 security/vuxml/vuln/2023.xml | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index a4ab8d31fc74..7c346be72fac 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -25,7 +25,7 @@
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">
 	<p>Oracle reports:</p>
-	<blockquote cite="https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL">
+	<blockquote cite="https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixMSQL">
 	  <p>This Critical Patch Update contains 34 new security patches, plus
 	    additional third party patches noted below, for Oracle MySQL. 11 of
 	    these vulnerabilities may be remotely exploitable without
@@ -61,11 +61,12 @@
       <cvename>CVE-2023-21940</cvename>
       <cvename>CVE-2023-21947</cvename>
       <cvename>CVE-2023-21963</cvename>
-      <url>https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL</url>
+      <url>https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixMSQL</url>
     </references>
     <dates>
       <discovery>2023-04-19</discovery>
       <entry>2023-04-22</entry>
+      <modified>2023-04-22</modified>
     </dates>
   </vuln>