From patchwork Tue Aug 15 16:18:00 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller?= X-Patchwork-Id: 7095 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4RQGfd0dKqz3wlH for ; Tue, 15 Aug 2023 16:18:49 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4RQGfb667rz2Yp; Tue, 15 Aug 2023 16:18:47 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4RQGfb5cfkz2xhD; Tue, 15 Aug 2023 16:18:47 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4RQGfZ0ccYz2xY1 for ; Tue, 15 Aug 2023 16:18:46 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4RQGfY2Rf4z2WY for ; Tue, 15 Aug 2023 16:18:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1692116325; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=gjmHmiaw2Ea5i9ros8rE6cbUYZ1p0mNQTT7UHtqGbGY=; b=k3CzcGMAU+tnTSpKHZKrQTRny81yhyFnJ8LNgfc/sB0FeK8hTDIJgJC5gGwqkVePjyZtyj kit9FPQBKiUeMVFi5t46K/icIeMJgnU+v37ZJkoR/yRjj5qF6j1/JX42giHdYQ8fT+ABTG GR6/ok3XMDsSF8miFsAsb/UJUjT64xHtEISkHflc0Rk69EV0NeODkelSW50AyA5WnrI/UK RwxQrGagIP9cP95c6OdP+NzKvSnjJqrceCjTuXhDyIEg0Ed/uX7GM28/BekFK76sKW6b+x jlpPedvwCPcENW3zE72GhIraOm4/ddcBE/oPLhiFGJhWCNvvlB1qbds5EyiXXQ== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1692116325; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=gjmHmiaw2Ea5i9ros8rE6cbUYZ1p0mNQTT7UHtqGbGY=; b=kr5ft3gELCPdUbdBCxa+2Y/Rskq14d2rsS7orQ2STEytBaNcu0FF4CqbWRowydU1K7Otbt /Pn8FM/V/gAA+oBg== Message-ID: Date: Tue, 15 Aug 2023 16:18:00 +0000 MIME-Version: 1.0 Subject: [PATCH 2/2] vulnerabilities.cgi: Avoid superfluous line breaks by widening SMT configuration table To: development@lists.ipfire.org References: <09cd3cb3-9340-4424-a71d-219fb3b1f969@ipfire.org> From: =?utf-8?q?Peter_M=C3=BCller?= In-Reply-To: <09cd3cb3-9340-4424-a71d-219fb3b1f969@ipfire.org> X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Peter Müller --- html/cgi-bin/vulnerabilities.cgi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/html/cgi-bin/vulnerabilities.cgi b/html/cgi-bin/vulnerabilities.cgi index 1fb57220e..1946cf171 100644 --- a/html/cgi-bin/vulnerabilities.cgi +++ b/html/cgi-bin/vulnerabilities.cgi @@ -183,7 +183,7 @@ print "
\n"; my $smt_status = &smt_status(); print < +