Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 23 Dec 2014 21:24:56 +0000 (UTC)
From:      Eygene Ryabinkin <rea@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r375358 - head/security/vuxml
Message-ID:  <201412232124.sBNLOunY054602@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rea
Date: Tue Dec 23 21:24:55 2014
New Revision: 375358
URL: https://svnweb.freebsd.org/changeset/ports/375358
QAT: https://qat.redports.org/buildarchive/r375358/

Log:
  Fix whitespace in entry for ntp (4033d826-87dd-11e4-9079-3c970e169bc2)

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Dec 23 21:22:35 2014	(r375357)
+++ head/security/vuxml/vuln.xml	Tue Dec 23 21:24:55 2014	(r375358)
@@ -119,7 +119,7 @@ Notes:
 	    be executed. ntp-keygen prior to version 4.2.7p230
 	    also uses a non-cryptographic random number generator
 	    when generating symmetric keys.</p>
-          <p>The buffer overflow vulnerabilities in ntpd may
+	  <p>The buffer overflow vulnerabilities in ntpd may
 	    allow a remote unauthenticated attacker to execute
 	    arbitrary malicious code with the privilege level
 	    of the ntpd process. The weak default key and



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201412232124.sBNLOunY054602>