Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 21 Feb 2016 14:54:03 +0000 (UTC)
From:      Jason Unovitch <junovitch@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r409291 - head/security/vuxml
Message-ID:  <201602211454.u1LEs3p7069391@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: junovitch
Date: Sun Feb 21 14:54:03 2016
New Revision: 409291
URL: https://svnweb.freebsd.org/changeset/ports/409291

Log:
  Respace entry so `make validate' passes

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Feb 21 14:24:08 2016	(r409290)
+++ head/security/vuxml/vuln.xml	Sun Feb 21 14:54:03 2016	(r409291)
@@ -61,40 +61,40 @@ Notes:
     <topic>jasper -- multiple vulnerabilities</topic>
     <affects>
       <package>
-        <name>jasper</name>
-        <range><le>1.900.1_16</le></range>
+	<name>jasper</name>
+	<range><le>1.900.1_16</le></range>
       </package>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-        <p>oCERT reports:</p>
-        <blockquote cite="http://www.ocert.org/advisories/ocert-2014-012.html">;
-          <p>The library is affected by a double-free vulnerability in function
-            jas_iccattrval_destroy()
-            as well as a heap-based buffer overflow in function jp2_decode().
-            A specially crafted jp2 file can be used to trigger the vulnerabilities.</p>
-        </blockquote>
-        <p>oCERT reports:</p>
-        <blockquote cite="http://www.ocert.org/advisories/ocert-2015-001.html">;
-          <p>The library is affected by an off-by-one error in a buffer boundary check
-            in jpc_dec_process_sot(), leading to a heap based buffer overflow, as well
-            as multiple unrestricted stack memory use issues in jpc_qmfb.c, leading to
-            stack overflow.
-            A specially crafted jp2 file can be used to trigger the vulnerabilities.</p>
-        </blockquote>
-        <p>oCERT reports:</p>
-        <blockquote cite="http://www.ocert.org/advisories/ocert-2014-009.html">;
-          <p>Multiple off-by-one flaws, leading to heap-based buffer overflows, were
-            found in the way JasPer decoded JPEG 2000 files. A specially crafted file
-            could cause an application using JasPer to crash or,
-            possibly, execute arbitrary code.</p>
-        </blockquote>
-        <p>limingxing reports:</p>
-        <blockquote cite="http://seclists.org/oss-sec/2016/q1/233">;
-          <p>A vulnerability was found in the way the JasPer's jas_matrix_clip()
-            function parses certain JPEG 2000 image files. A specially crafted file
-            could cause an application using JasPer to crash.</p>
-        </blockquote>
+	<p>oCERT reports:</p>
+	<blockquote cite="http://www.ocert.org/advisories/ocert-2014-012.html">;
+	  <p>The library is affected by a double-free vulnerability in function
+	    jas_iccattrval_destroy()
+	    as well as a heap-based buffer overflow in function jp2_decode().
+	    A specially crafted jp2 file can be used to trigger the vulnerabilities.</p>
+	</blockquote>
+	<p>oCERT reports:</p>
+	<blockquote cite="http://www.ocert.org/advisories/ocert-2015-001.html">;
+	  <p>The library is affected by an off-by-one error in a buffer boundary check
+	    in jpc_dec_process_sot(), leading to a heap based buffer overflow, as well
+	    as multiple unrestricted stack memory use issues in jpc_qmfb.c, leading to
+	    stack overflow.
+	    A specially crafted jp2 file can be used to trigger the vulnerabilities.</p>
+	</blockquote>
+	<p>oCERT reports:</p>
+	<blockquote cite="http://www.ocert.org/advisories/ocert-2014-009.html">;
+	  <p>Multiple off-by-one flaws, leading to heap-based buffer overflows, were
+	    found in the way JasPer decoded JPEG 2000 files. A specially crafted file
+	    could cause an application using JasPer to crash or,
+	    possibly, execute arbitrary code.</p>
+	</blockquote>
+	<p>limingxing reports:</p>
+	<blockquote cite="http://seclists.org/oss-sec/2016/q1/233">;
+	  <p>A vulnerability was found in the way the JasPer's jas_matrix_clip()
+	    function parses certain JPEG 2000 image files. A specially crafted file
+	    could cause an application using JasPer to crash.</p>
+	</blockquote>
       </body>
     </description>
     <references>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201602211454.u1LEs3p7069391>