git: 57f752e585e0 - main - security/vuxml: Fix bad copy/past in latest frr entry

From: Olivier Cochard <olivier_at_FreeBSD.org>
Date: Fri, 28 Jun 2024 17:06:27 UTC
The branch main has been updated by olivier:

URL: https://cgit.FreeBSD.org/ports/commit/?id=57f752e585e0b1d6aefa48bab23b1508264d88ba

commit 57f752e585e0b1d6aefa48bab23b1508264d88ba
Author:     Olivier Cochard <olivier@FreeBSD.org>
AuthorDate: 2024-06-28 17:05:39 +0000
Commit:     Olivier Cochard <olivier@FreeBSD.org>
CommitDate: 2024-06-28 17:05:39 +0000

    security/vuxml: Fix bad copy/past in latest frr entry
---
 security/vuxml/vuln/2024.xml | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 641d501a5081..98d777ada355 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -14,9 +14,7 @@
 	<body xmlns="http://www.w3.org/1999/xhtml">
 	<p>cve@mitre.org reports:</p>
 	<blockquote cite="https://frrouting.org/release/9.1.1/">
-	  <p>In FRRouting (FRR) through 9.1, there are multiplecan be a buffer overflow and
-	daemon crash in ospf_te_parse_ri for OSPF LSA packets during an
-	attempt to read Segment Routing subTLVs (their size is not validated).</p>
+	  <p>In FRRouting (FRR) through 9.1, there are multiples vulnerabilities.</p>
 	<ul>
 	 <li>CVE-2024-31950: buffer overflow and daemon crash in ospf_te_parse_ri for OSPF LSA packets</li>
 	 <li>CVE-2024-31951: buffer overflow and daemon crash in ospf_te_parse_ext_link for OSPF LSA packets</li>