Date: Tue, 5 Jan 2016 14:27:32 +0000 (UTC) From: Martin Wilke <miwi@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r405292 - head/security/vuxml Message-ID: <201601051427.u05ERWJV051620@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: miwi Date: Tue Jan 5 14:27:32 2016 New Revision: 405292 URL: https://svnweb.freebsd.org/changeset/ports/405292 Log: - Cleanup empty lines Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jan 5 13:46:12 2016 (r405291) +++ head/security/vuxml/vuln.xml Tue Jan 5 14:27:32 2016 (r405292) @@ -133,7 +133,6 @@ Notes: <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>ISC Support reports:</p> - <blockquote cite="https://kb.isc.org/article/AA-01318/0/CVE-2015-8373-ISC-Kea%3A-unexpected-termination-while-handling-a-malformed-packet.html"> <p>ISC Kea may terminate unexpectedly (crash) while handling a malformed client packet. Related defects in the kea-dhcp4 @@ -142,7 +141,6 @@ Notes: An attacker sending a crafted malformed packet can cause an ISC Kea server providing DHCP services to IPv4 or IPv6 clients to exit unexpectedly.</p> - <ul> <li><p>The kea-dhcp4 server is vulnerable only in versions 0.9.2 and 1.0.0-beta, and furthermore only when logging @@ -150,7 +148,6 @@ Notes: versions 0.9.1 or lower, and servers which are not logging or are logging at debug level 39 or below are not vulnerable.</p></li> - <li><p>The kea-dhcp6 server is vulnerable only in versions 0.9.2 and 1.0.0-beta, and furthermore only when logging at debug level 45 or higher. Servers running
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601051427.u05ERWJV051620>