Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 9 Mar 2014 18:59:15 +0000 (UTC)
From:      Remko Lodder <remko@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r347684 - head/security/vuxml
Message-ID:  <201403091859.s29IxFI1001779@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: remko (src,doc committer)
Date: Sun Mar  9 18:59:15 2014
New Revision: 347684
URL: http://svnweb.freebsd.org/changeset/ports/347684
QAT: https://qat.redports.org/buildarchive/r347684/

Log:
  Properly indent the last entry.
  
  Discussed with:	kwm

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Mar  9 18:50:42 2014	(r347683)
+++ head/security/vuxml/vuln.xml	Sun Mar  9 18:59:15 2014	(r347684)
@@ -63,11 +63,12 @@ Note:  Please add new entries to the beg
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Mateusz Jurczyk reports:</p>
 	<blockquote cite="http://savannah.nongnu.org/bugs/?41697">;
-	  <p>Out of bounds stack-based read/write in cf2_hintmap_build.
-             This is a critical vulnerability in the CFF Rasterizer code
-             recently contributed by Adobe, leading to potential arbitrary
-             code execution in the context of the FreeType2 library client.
-             </p>
+	  <p>Out of bounds stack-based read/write in
+	    cf2_hintmap_build.</p>
+	  <p>This is a critical vulnerability in the CFF Rasterizer
+	    code recently contributed by Adobe, leading to potential
+	    arbitrary code execution in the context of the FreeType2
+	    library client.</p>
 	</blockquote>
       </body>
     </description>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403091859.s29IxFI1001779>