From owner-svn-ports-head@FreeBSD.ORG Thu May 29 15:24:55 2014
Return-Path:
Delivered-To: svn-ports-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A6A05DA5;
Thu, 29 May 2014 15:24:55 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 94B8A2585;
Thu, 29 May 2014 15:24:55 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s4TFOt9o062187;
Thu, 29 May 2014 15:24:55 GMT (envelope-from miwi@svn.freebsd.org)
Received: (from miwi@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s4TFOtJP062186;
Thu, 29 May 2014 15:24:55 GMT (envelope-from miwi@svn.freebsd.org)
Message-Id: <201405291524.s4TFOtJP062186@svn.freebsd.org>
From: Martin Wilke
Date: Thu, 29 May 2014 15:24:55 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r355710 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-head@freebsd.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: SVN commit messages for the ports tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 29 May 2014 15:24:55 -0000
Author: miwi
Date: Thu May 29 15:24:54 2014
New Revision: 355710
URL: http://svnweb.freebsd.org/changeset/ports/355710
QAT: https://qat.redports.org/buildarchive/r355710/
Log:
- Fix formating
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu May 29 15:17:17 2014 (r355709)
+++ head/security/vuxml/vuln.xml Thu May 29 15:24:54 2014 (r355710)
@@ -70,7 +70,8 @@ Notes:
Mumble reports:
SVG images with local file references could trigger client DoS
- The Mumble client did not properly HTML-escape some external strings before using them in a rich-text (HTML) context.
+ The Mumble client did not properly HTML-escape some external strings
+ before using them in a rich-text (HTML) context.
Mumble reports:
- A malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access.
- A malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow.
+ A malformed Opus voice packet sent to a Mumble client could trigger
+ a NULL pointer dereference or an out-of-bounds array access.
+ A malformed Opus voice packet sent to a Mumble client could trigger a
+ heap-based buffer overflow.