svn commit: r313798 - head/security/vuxml
Martin Wilke
miwi at FreeBSD.org
Sun Mar 10 04:03:18 UTC 2013
Author: miwi
Date: Sun Mar 10 04:03:12 2013
New Revision: 313798
URL: http://svnweb.freebsd.org/changeset/ports/313798
Log:
- Fix previous entry
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sun Mar 10 03:52:04 2013 (r313797)
+++ head/security/vuxml/vuln.xml Sun Mar 10 04:03:12 2013 (r313798)
@@ -64,12 +64,16 @@ Note: Please add new entries to the beg
<p>Pidgin reports:</p>
<blockquote cite="https://developer.pidgin.im/wiki/ChangeLog">
<p>libpurple</p>
- <p> -- Fix a crash when receiving UPnP responses with abnormally long values. (CVE-2013-0274)</p>
+ <p>Fix a crash when receiving UPnP responses with abnormally long values.</p>
<p>MXit</p>
- <p> -- Fix two bugs where a remote MXit user could possibly specify a local file path to be written to. (CVE-2013-0271)</p>
- <p> -- Fix a bug where the MXit server or a man-in-the-middle could potentially send specially crafted data that could overflow a buffer and lead to a crash or remote code execution. (CVE-2013-0272)</p>
+ <p>Fix two bugs where a remote MXit user could possibly specify a local file
+ path to be written to.</p>
+ <p>Fix a bug where the MXit server or a man-in-the-middle could potentially
+ send specially crafted data that could overflow a buffer and lead to a crash
+ or remote code execution.</p>
<p>Sametime</p>
- <p> -- Fix a crash in Sametime when a malicious server sends us an abnormally long user ID. (CVE-2013-0273)</p>
+ <p>Fix a crash in Sametime when a malicious server sends us an abnormally long
+ user ID.</p>
</blockquote>
</body>
</description>
@@ -416,8 +420,8 @@ Note: Please add new entries to the beg
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Mark Evans reports:</p>
<blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo">
- <p>Unfortunately there is a security vulnerability in Dragonfly when
- used with Rails which would potentially allow an attacker to run
+ <p>Unfortnately there is a security vulnerability in Dragonfly when
+ used with Rails which would potentially allow an attacker to run
arbitrary code on a host machine using carefully crafted
requests.
</p>
More information about the svn-ports-all
mailing list