Date: Sun, 9 Mar 2014 21:38:53 +0000 (UTC) From: Remko Lodder <remko@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r347694 - branches/2014Q1/security/vuxml Message-ID: <201403092138.s29LcrQR068749@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: remko (src,doc committer) Date: Sun Mar 9 21:38:53 2014 New Revision: 347694 URL: http://svnweb.freebsd.org/changeset/ports/347694 QAT: https://qat.redports.org/buildarchive/r347694/ Log: MFH: r347684 Properly indent the last entry. Discussed with: kwm Approved by: portmgr(erwin) Modified: branches/2014Q1/security/vuxml/vuln.xml Directory Properties: branches/2014Q1/ (props changed) Modified: branches/2014Q1/security/vuxml/vuln.xml ============================================================================== --- branches/2014Q1/security/vuxml/vuln.xml Sun Mar 9 21:37:59 2014 (r347693) +++ branches/2014Q1/security/vuxml/vuln.xml Sun Mar 9 21:38:53 2014 (r347694) @@ -63,11 +63,12 @@ Note: Please add new entries to the beg <body xmlns="http://www.w3.org/1999/xhtml"> <p>Mateusz Jurczyk reports:</p> <blockquote cite="http://savannah.nongnu.org/bugs/?41697"> - <p>Out of bounds stack-based read/write in cf2_hintmap_build. - This is a critical vulnerability in the CFF Rasterizer code - recently contributed by Adobe, leading to potential arbitrary - code execution in the context of the FreeType2 library client. - </p> + <p>Out of bounds stack-based read/write in + cf2_hintmap_build.</p> + <p>This is a critical vulnerability in the CFF Rasterizer + code recently contributed by Adobe, leading to potential + arbitrary code execution in the context of the FreeType2 + library client.</p> </blockquote> </body> </description>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403092138.s29LcrQR068749>