svn commit: r355710 - head/security/vuxml
Martin Wilke
miwi at FreeBSD.org
Thu May 29 15:24:55 UTC 2014
Author: miwi
Date: Thu May 29 15:24:54 2014
New Revision: 355710
URL: http://svnweb.freebsd.org/changeset/ports/355710
QAT: https://qat.redports.org/buildarchive/r355710/
Log:
- Fix formating
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu May 29 15:17:17 2014 (r355709)
+++ head/security/vuxml/vuln.xml Thu May 29 15:24:54 2014 (r355710)
@@ -70,7 +70,8 @@ Notes:
<p>Mumble reports:</p>
<blockquote cite="http://blog.mumble.info/mumble-1-2-6/">
<p>SVG images with local file references could trigger client DoS</p>
- <p>The Mumble client did not properly HTML-escape some external strings before using them in a rich-text (HTML) context.</p>
+ <p>The Mumble client did not properly HTML-escape some external strings
+ before using them in a rich-text (HTML) context.</p>
</blockquote>
</body>
</description>
@@ -96,8 +97,10 @@ Notes:
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Mumble reports:</p>
<blockquote cite="http://blog.mumble.info/mumble-1-2-5/">
- <p>A malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access.</p>
- <p>A malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow.</p>
+ <p>A malformed Opus voice packet sent to a Mumble client could trigger
+ a NULL pointer dereference or an out-of-bounds array access.</p>
+ <p>A malformed Opus voice packet sent to a Mumble client could trigger a
+ heap-based buffer overflow.</p>
</blockquote>
</body>
</description>
More information about the svn-ports-all
mailing list