git: 433216ab05d0 - main - security/vuxml: fix validation errors

From: Philip Paeps <philip_at_FreeBSD.org>
Date: Wed, 04 Oct 2023 01:18:02 UTC
The branch main has been updated by philip:

URL: https://cgit.FreeBSD.org/ports/commit/?id=433216ab05d04f834b1cca92a57f57145f216a83

commit 433216ab05d04f834b1cca92a57f57145f216a83
Author:     Philip Paeps <philip@FreeBSD.org>
AuthorDate: 2023-10-04 01:16:18 +0000
Commit:     Philip Paeps <philip@FreeBSD.org>
CommitDate: 2023-10-04 01:16:18 +0000

    security/vuxml: fix validation errors
    
    Fix whitespace errors in vid 6e0ebb4a-5e75-11ee-a365-001b217b3468
    introduced by commit 36a838e202256d5a528abfc8ff6a66ca7ce4d148.
---
 security/vuxml/vuln/2023.xml | 34 +++++++++++++++++-----------------
 1 file changed, 17 insertions(+), 17 deletions(-)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 5688a356c700..286acda968b5 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -202,23 +202,23 @@
     </affects>
     <description>
       <body>
-	<p>Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project</p>	
-	<p>Group import allows impersonation of users in CI pipelines</p>	
-	<p>Developers can bypass code owners approval by changing a MR's base branch</p>	
-  	<p>Leaking source code of restricted project through a fork</p>	
-	<p>Third party library Consul requires enable-script-checks to be False to enable patch</p>	
-	<p>Service account not deleted when namespace is deleted allowing access to internal projects</p>	
-	<p>Enforce SSO settings bypassed for public projects for Members without identity</p>	
-	<p>Removed project member can write to protected branches</p>	
-	<p>Unauthorised association of CI jobs for Machine Learning experiments</p>	
-	<p>Force pipelines to not have access to protected variables and will likely fail using tags</p>	
-	<p>Maintainer can create a fork relationship between existing projects</p>	
-	<p>Disclosure of masked CI variables via processing CI/CD configuration of forks</p>	
-	<p>Asset Proxy Bypass using non-ASCII character in asset URI</p>	
-	<p>Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches</p>	
-	<p>Removed Developer can continue editing the source code of a public project</p>	
-	<p>A project reporter can leak owner's Sentry instance projects</p>	
-	<p>Math rendering in markdown can escape container and hijack clicks</p>	
+	<p>Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project</p>
+	<p>Group import allows impersonation of users in CI pipelines</p>
+	<p>Developers can bypass code owners approval by changing a MR's base branch</p>
+	<p>Leaking source code of restricted project through a fork</p>
+	<p>Third party library Consul requires enable-script-checks to be False to enable patch</p>
+	<p>Service account not deleted when namespace is deleted allowing access to internal projects</p>
+	<p>Enforce SSO settings bypassed for public projects for Members without identity</p>
+	<p>Removed project member can write to protected branches</p>
+	<p>Unauthorised association of CI jobs for Machine Learning experiments</p>
+	<p>Force pipelines to not have access to protected variables and will likely fail using tags</p>
+	<p>Maintainer can create a fork relationship between existing projects</p>
+	<p>Disclosure of masked CI variables via processing CI/CD configuration of forks</p>
+	<p>Asset Proxy Bypass using non-ASCII character in asset URI</p>
+	<p>Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches</p>
+	<p>Removed Developer can continue editing the source code of a public project</p>
+	<p>A project reporter can leak owner's Sentry instance projects</p>
+	<p>Math rendering in markdown can escape container and hijack clicks</p>
       </body>
     </description>
     <references>