Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Mar 2013 04:03:12 +0000 (UTC)
From:      Martin Wilke <miwi@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r313798 - head/security/vuxml
Message-ID:  <201303100403.r2A43CZ7039155@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: miwi
Date: Sun Mar 10 04:03:12 2013
New Revision: 313798
URL: http://svnweb.freebsd.org/changeset/ports/313798

Log:
  - Fix previous entry

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Mar 10 03:52:04 2013	(r313797)
+++ head/security/vuxml/vuln.xml	Sun Mar 10 04:03:12 2013	(r313798)
@@ -64,12 +64,16 @@ Note:  Please add new entries to the beg
 	<p>Pidgin reports:</p>
 	<blockquote cite="https://developer.pidgin.im/wiki/ChangeLog">;
 	  <p>libpurple</p>
-	  <p> -- Fix a crash when receiving UPnP responses with abnormally long values. (CVE-2013-0274)</p>
+	  <p>Fix a crash when receiving UPnP responses with abnormally long values.</p>
 	  <p>MXit</p>
-	  <p> -- Fix two bugs where a remote MXit user could possibly specify a local file path to be written to. (CVE-2013-0271)</p>
-	  <p> -- Fix a bug where the MXit server or a man-in-the-middle could potentially send specially crafted data that could overflow a buffer and lead to a crash or remote code execution. (CVE-2013-0272)</p>
+	  <p>Fix two bugs where a remote MXit user could possibly specify a local file
+	    path to be written to.</p>
+	  <p>Fix a bug where the MXit server or a man-in-the-middle could potentially
+	    send specially crafted data that could overflow a buffer and lead to a crash
+	    or remote code execution.</p>
 	  <p>Sametime</p>
-	  <p> -- Fix a crash in Sametime when a malicious server sends us an abnormally long user ID. (CVE-2013-0273)</p>
+	  <p>Fix a crash in Sametime when a malicious server sends us an abnormally long
+	    user ID.</p>
 	</blockquote>
       </body>
     </description>
@@ -416,8 +420,8 @@ Note:  Please add new entries to the beg
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Mark Evans reports:</p>
 	<blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo">;
-	  <p>Unfortunately there is a security vulnerability in Dragonfly when
-	     used with Rails which would potentially allow an attacker to run
+	  <p>Unfortnately there is a security vulnerability in Dragonfly when
+	      used with Rails which would potentially allow an attacker to run
 	     arbitrary code on a host machine using carefully crafted
              requests.
           </p>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201303100403.r2A43CZ7039155>