Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Aug 2018 16:32:58 +0000 (UTC)
From:      Adam Weinberger <adamw@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r476183 - head/security/vuxml
Message-ID:  <201808011632.w71GWwft054607@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: adamw
Date: Wed Aug  1 16:32:58 2018
New Revision: 476183
URL: https://svnweb.freebsd.org/changeset/ports/476183

Log:
  Fix a common grammar error: "can not" means the opposite of "cannot."
  
  "Can not" means "it is possible not to," and "cannot" means "it is impossible to."

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Aug  1 14:20:32 2018	(r476182)
+++ head/security/vuxml/vuln.xml	Wed Aug  1 16:32:58 2018	(r476183)
@@ -68619,7 +68619,7 @@ affected..</p>
 	  driver to dereference an invalid pointer.</p>
 	<p>Although this has not been confirmed, the possibility that
 	  an attacker may be able to execute arbitrary code in kernel
-	  context can not be ruled out.</p>
+	  context cannot be ruled out.</p>
       </body>
     </description>
     <references>
@@ -79852,7 +79852,7 @@ executed in your Internet Explorer while displaying th
 	<p>Problem description:</p>
 	<blockquote cite="http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc">;
 	  <p>There is a programming error in the DES implementation used in crypt()
-	     when handling input which contains characters that can not be represented
+	     when handling input which contains characters that cannot be represented
 	     with 7-bit ASCII.</p>
 	  <p>When the input contains characters with only the most significant bit set
 	     (0x80), that character and all characters after it will be ignored.</p>
@@ -89842,7 +89842,7 @@ executed in your Internet Explorer while displaying th
 	    being too small, allowing it to be overwritten. The impact of this
 	    programming error is that MaraDNS can be crashed by sending
 	    MaraDNS a single "packet of death". Since the data placed in the
-	    overwritten array can not be remotely controlled (it is a list of
+	    overwritten array cannot be remotely controlled (it is a list of
 	    increasing integers), there is no way to increase privileges
 	    exploiting this bug.</p>
 	</blockquote>
@@ -115625,7 +115625,7 @@ executed in your Internet Explorer while displaying th
 	RealMedia RTSP streams. When checking for matching asm rules, the code
 	stores the results in a fixed-size array, but no boundary checks are
 	performed. This may lead to a buffer overflow if the user is tricked
-	into connecting to a malicious server. Since the attacker can not write
+	into connecting to a malicious server. Since the attacker cannot write
 	arbitrary data into the buffer, creating an exploit is very hard; but a
 	DoS attack is easily made.
 	A fix for this problem was committed to SVN on Sun Dec 31 13:27:53 2006



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201808011632.w71GWwft054607>