Date: Sat, 5 Mar 2016 13:10:35 +0000 (UTC) From: Raphael Kubo da Costa <rakuco@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r410178 - head/security/vuxml Message-ID: <201603051310.u25DAZ7h017871@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: rakuco Date: Sat Mar 5 13:10:35 2016 New Revision: 410178 URL: https://svnweb.freebsd.org/changeset/ports/410178 Log: Make 7d09b9ee-e0ba-11e5-abc4-6fb07af136d2 pass `make validate'. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Mar 5 13:09:48 2016 (r410177) +++ head/security/vuxml/vuln.xml Sat Mar 5 13:10:35 2016 (r410178) @@ -108,7 +108,7 @@ Notes: </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The Exim development team reports:</p> + <p>The Exim development team reports:</p> <blockquote cite="https://lists.exim.org/lurker/message/20160302.191005.a72d8433.en.html"> <p>All installations having Exim set-uid root and using 'perl_startup' are vulnerable to a local privilege escalation. Any user who can start an
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201603051310.u25DAZ7h017871>