Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 5 Mar 2016 13:10:35 +0000 (UTC)
From:      Raphael Kubo da Costa <rakuco@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r410178 - head/security/vuxml
Message-ID:  <201603051310.u25DAZ7h017871@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rakuco
Date: Sat Mar  5 13:10:35 2016
New Revision: 410178
URL: https://svnweb.freebsd.org/changeset/ports/410178

Log:
  Make 7d09b9ee-e0ba-11e5-abc4-6fb07af136d2 pass `make validate'.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Mar  5 13:09:48 2016	(r410177)
+++ head/security/vuxml/vuln.xml	Sat Mar  5 13:10:35 2016	(r410178)
@@ -108,7 +108,7 @@ Notes:
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-      	<p>The Exim development team reports:</p>
+	<p>The Exim development team reports:</p>
 	<blockquote cite="https://lists.exim.org/lurker/message/20160302.191005.a72d8433.en.html">;
 	<p>All installations having Exim set-uid root and using 'perl_startup' are
 	vulnerable to a local privilege escalation. Any user who can start an



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201603051310.u25DAZ7h017871>