Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 Jan 2014 22:46:38 +0000 (UTC)
From:      Matthew Seaman <matthew@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r341466 - head/security/vuxml
Message-ID:  <201401272246.s0RMkcXA043615@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: matthew
Date: Mon Jan 27 22:46:38 2014
New Revision: 341466
URL: http://svnweb.freebsd.org/changeset/ports/341466
QAT: https://qat.redports.org/buildarchive/r341466/

Log:
  Formatting fixes
  
  Submitted by:	remko

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Jan 27 22:19:40 2014	(r341465)
+++ head/security/vuxml/vuln.xml	Mon Jan 27 22:46:38 2014	(r341466)
@@ -68,26 +68,26 @@ Note:  Please add new entries to the beg
 	<p>The RT development team reports:</p>
 	<blockquote cite="http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html">;
 	  <p>Versions of RT between 4.2.0 and 4.2.2 (inclusive) are
-	  vulnerable to a denial-of-service attack via the email
-	  gateway; any installation which accepts mail from untrusted
-	  sources is vulnerable, regardless of the permissions
-	  configuration inside RT. This vulnerability is assigned
-	  CVE-2014-1474.</p>
+	    vulnerable to a denial-of-service attack via the email
+	    gateway; any installation which accepts mail from untrusted
+	    sources is vulnerable, regardless of the permissions
+	    configuration inside RT. This vulnerability is assigned
+	    CVE-2014-1474.</p>
 	  <p>This vulnerability is caused by poor parsing performance
-	  in the Email::Address::List module, which RT depends on. We
-	  recommend that affected users upgrade their version of
-	  Email::Address::List to v0.02 or above, which resolves the
-	  issue. Due to a communications mishap, the release on CPAN
-	  will temporarily appear as "unauthorized," and the
-	  command-line cpan client will hence not install it. We
-	  expect this to be resolved shortly; in the meantime, the
-	  release is also available from our server.</p>
+	    in the Email::Address::List module, which RT depends on. We
+	    recommend that affected users upgrade their version of
+	    Email::Address::List to v0.02 or above, which resolves the
+	    issue. Due to a communications mishap, the release on CPAN
+	    will temporarily appear as "unauthorized," and the
+	    command-line cpan client will hence not install it. We
+	    expect this to be resolved shortly; in the meantime, the
+	    release is also available from our server.</p>
 	</blockquote>
       </body>
     </description>
     <references>
-      <url>http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html</url>;
       <cvename>CVE-2014-1474</cvename>
+      <url>http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html</url>;
     </references>
     <dates>
       <discovery>2014-01-27</discovery>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401272246.s0RMkcXA043615>