Date: Sun, 9 Mar 2014 18:59:15 +0000 (UTC) From: Remko Lodder <remko@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r347684 - head/security/vuxml Message-ID: <201403091859.s29IxFI1001779@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: remko (src,doc committer) Date: Sun Mar 9 18:59:15 2014 New Revision: 347684 URL: http://svnweb.freebsd.org/changeset/ports/347684 QAT: https://qat.redports.org/buildarchive/r347684/ Log: Properly indent the last entry. Discussed with: kwm Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Mar 9 18:50:42 2014 (r347683) +++ head/security/vuxml/vuln.xml Sun Mar 9 18:59:15 2014 (r347684) @@ -63,11 +63,12 @@ Note: Please add new entries to the beg <body xmlns="http://www.w3.org/1999/xhtml"> <p>Mateusz Jurczyk reports:</p> <blockquote cite="http://savannah.nongnu.org/bugs/?41697"> - <p>Out of bounds stack-based read/write in cf2_hintmap_build. - This is a critical vulnerability in the CFF Rasterizer code - recently contributed by Adobe, leading to potential arbitrary - code execution in the context of the FreeType2 library client. - </p> + <p>Out of bounds stack-based read/write in + cf2_hintmap_build.</p> + <p>This is a critical vulnerability in the CFF Rasterizer + code recently contributed by Adobe, leading to potential + arbitrary code execution in the context of the FreeType2 + library client.</p> </blockquote> </body> </description>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403091859.s29IxFI1001779>