Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 30 Mar 2023 11:42:57 GMT
From:      Bernard Spil <brnrd@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 107b89c02162 - main - security/vuxml: Fix typo in blockquote
Message-ID:  <202303301142.32UBgvI2098998@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by brnrd:

URL: https://cgit.FreeBSD.org/ports/commit/?id=107b89c02162b4ebaecf780581941b0179bdc845

commit 107b89c02162b4ebaecf780581941b0179bdc845
Author:     Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2023-03-30 11:42:19 +0000
Commit:     Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2023-03-30 11:42:19 +0000

    security/vuxml: Fix typo in blockquote
---
 security/vuxml/vuln/2023.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 58a42a03fa5d..8dd558e548b7 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -69,7 +69,7 @@
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>The OpenSSL project reports:</p>
-	<blockquote cite="https://www.openssl.org/news/secadv/20230328.txtE">;
+	<blockquote cite="https://www.openssl.org/news/secadv/20230328.txt">;
 	  <p>Severity: low</p>
 	  <p>Applications that use a non-default option when verifying certificates may be
 	    vulnerable to an attack from a malicious CA to circumvent certain checks.</p>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202303301142.32UBgvI2098998>