aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln/2023.xml
diff options
context:
space:
mode:
authorMatthias Andree <mandree@FreeBSD.org>2023-05-13 21:08:37 +0000
committerMatthias Andree <mandree@FreeBSD.org>2023-05-13 21:11:47 +0000
commit5956d64dc65f8f5d0e83b258fc360b79757572c4 (patch)
treea88dd1c7d9d8dabfa292110425dcf74b22217487 /security/vuxml/vuln/2023.xml
parent3660e340fc669a4a5646324fd313b77e19f1578f (diff)
downloadports-5956d64dc65f8f5d0e83b258fc360b79757572c4.tar.gz
ports-5956d64dc65f8f5d0e83b258fc360b79757572c4.zip
security/vuxml: add missing xmlns to body tag of
2023's vuln entry 8e20430d-a72b-11ed-a04f-40b034455553 (MinIO admin user creation from unprivileged account, CVE-2022-24842) This fixes vxquery complaints (the line number might differ depending on how many entries we've added to vuln/2023.xml): Parsing failed @ line 4675: Expected element in XHTML namespace.
Diffstat (limited to 'security/vuxml/vuln/2023.xml')
-rw-r--r--security/vuxml/vuln/2023.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 1b2b661f3547..cb20ced9aa83 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -4591,7 +4591,7 @@
</package>
</affects>
<description>
- <body>
+ <body xmlns="http://www.w3.org/1999/xhtml">
<p>MinIO reports:</p>
<blockquote cite="https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q">
<p>