svn commit: r355710 - head/security/vuxml

Martin Wilke miwi at FreeBSD.org
Thu May 29 15:24:55 UTC 2014


Author: miwi
Date: Thu May 29 15:24:54 2014
New Revision: 355710
URL: http://svnweb.freebsd.org/changeset/ports/355710
QAT: https://qat.redports.org/buildarchive/r355710/

Log:
  - Fix formating

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu May 29 15:17:17 2014	(r355709)
+++ head/security/vuxml/vuln.xml	Thu May 29 15:24:54 2014	(r355710)
@@ -70,7 +70,8 @@ Notes:
 	<p>Mumble reports:</p>
 	<blockquote cite="http://blog.mumble.info/mumble-1-2-6/">
 	  <p>SVG images with local file references could trigger client DoS</p>
-	  <p>The Mumble client did not properly HTML-escape some external strings before using them in a rich-text (HTML) context.</p>
+	  <p>The Mumble client did not properly HTML-escape some external strings
+	    before using them in a rich-text (HTML) context.</p>
 	</blockquote>
       </body>
     </description>
@@ -96,8 +97,10 @@ Notes:
       <body xmlns="http://www.w3.org/1999/xhtml">
 	<p>Mumble reports:</p>
 	<blockquote cite="http://blog.mumble.info/mumble-1-2-5/">
-	  <p>A malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access.</p>
-	  <p>A malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow.</p>
+	  <p>A malformed Opus voice packet sent to a Mumble client could trigger
+	    a NULL pointer dereference or an out-of-bounds array access.</p>
+	  <p>A malformed Opus voice packet sent to a Mumble client could trigger a
+	    heap-based buffer overflow.</p>
 	</blockquote>
       </body>
     </description>


More information about the svn-ports-head mailing list