aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2013-08-17 16:36:30 +0800
committerremko <remko@FreeBSD.org>2013-08-17 16:36:30 +0800
commitfe772cad51dd34fa9692c361ee2c026237309a5e (patch)
treee0d78d2b47c9a50a911969863f0ef3e00fae6e4b /security
parent2cb33e1c8c54f7380032470465861d7a4e9e58fd (diff)
downloadfreebsd-ports-gnome-fe772cad51dd34fa9692c361ee2c026237309a5e.tar.gz
freebsd-ports-gnome-fe772cad51dd34fa9692c361ee2c026237309a5e.tar.zst
freebsd-ports-gnome-fe772cad51dd34fa9692c361ee2c026237309a5e.zip
Correct latest entry, properly indent the paragraphs
and sort the url list alphabetically.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml6
1 files changed, 3 insertions, 3 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 623d9727e7de..0960423dee46 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -66,15 +66,15 @@ Note: Please add new entries to the beginning of this file.
<p>Noteworthy changes in version 1.5.3:</p>
<p>Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys...</p>
<p>Note that Libgcrypt is used by GnuPG 2.x and thus this release fixes the above
- problem. The fix for GnuPG less than 2.0 can be found in the just released GnuPG
- 1.4.14.</p>
+ problem. The fix for GnuPG less than 2.0 can be found in the just released GnuPG
+ 1.4.14.</p>
</blockquote>
</body>
</description>
<references>
+ <url>http://eprint.iacr.org/2013/448</url>
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000329.html</url>
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html</url>
- <url>http://eprint.iacr.org/2013/448</url>
</references>
<dates>
<discovery>2013-07-18</discovery>