Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 31 Aug 2012 15:17:13 +0000 (UTC)
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r303428 - head/security/vuxml
Message-ID:  <201208311517.q7VFHDUH052050@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mandree
Date: Fri Aug 31 15:17:13 2012
New Revision: 303428
URL: http://svn.freebsd.org/changeset/ports/303428

Log:
  Tidy up paragraph formatting (it passed "make validate" before).
  
  Suggested by:	wxs

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Aug 31 14:38:38 2012	(r303427)
+++ head/security/vuxml/vuln.xml	Fri Aug 31 15:17:13 2012	(r303428)
@@ -396,16 +396,14 @@ Note:  Please add new entries to the beg
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Matthias Andree reports:</p>
 	<blockquote cite="http://www.fetchmail.info/fetchmail-SA-2012-01.txt">;
-	  <p>Fetchmail version 6.3.9 enabled "all SSL workarounds" (SSL_OP_ALL) which
-	    contains a switch to disable a countermeasure against certain attacks
-	    against block ciphers that permit guessing the initialization vectors,
-	    providing that an attacker can make the application (fetchmail) encrypt
-	    some data for him -- which is not easily the case.
-	  
-	    Stream ciphers (such as RC4) are unaffected.
-	    </p><p>
-	    Credits to Apple Product Security for reporting this.
-	  </p>
+	  <p>Fetchmail version 6.3.9 enabled "all SSL workarounds" (SSL_OP_ALL)
+	    which contains a switch to disable a countermeasure against certain
+	    attacks against block ciphers that permit guessing the
+	    initialization vectors, providing that an attacker can make the
+	    application (fetchmail) encrypt some data for him -- which is not
+	    easily the case.</p>
+	  <p>Stream ciphers (such as RC4) are unaffected.</p>
+	  <p>Credits to Apple Product Security for reporting this.</p>
 	</blockquote>
       </body>
     </description>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201208311517.q7VFHDUH052050>