Whitespace-only fixes missed in earlier commits, translators please

ignore.
This commit is contained in:
Warren Block 2014-02-16 05:17:25 +00:00
parent cbe7969710
commit 2b19f08387
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=43959

View file

@ -71,11 +71,11 @@
</important>
<para>Please make sure that the port's revision is bumped as soon
as the vulnerability has been closed. That is how the users who
as the vulnerability has been closed. That is how the users who
upgrade installed packages on a regular basis will see they need
to run an update. Besides, a new package will be built and
to run an update. Besides, a new package will be built and
distributed over FTP and WWW mirrors, replacing the vulnerable
one. <varname>PORTREVISION</varname> should be bumped unless
one. <varname>PORTREVISION</varname> should be bumped unless
<varname>PORTVERSION</varname> has changed in the course of
correcting the vulnerability. That is you should bump
<varname>PORTREVISION</varname> if you have added a patch file
@ -150,7 +150,7 @@
similar to HTML. The major difference is that XML is
e<emphasis>X</emphasis>tensible, i.e., based on defining
custom tags. Due to its intrinsic structure XML puts
otherwise amorphous data into shape. VuXML is particularly
otherwise amorphous data into shape. VuXML is particularly
tailored to mark up descriptions of security
vulnerabilities.</para>