svn commit: r476183 - head/security/vuxml
Adam Weinberger
adamw at FreeBSD.org
Wed Aug 1 16:33:00 UTC 2018
Author: adamw
Date: Wed Aug 1 16:32:58 2018
New Revision: 476183
URL: https://svnweb.freebsd.org/changeset/ports/476183
Log:
Fix a common grammar error: "can not" means the opposite of "cannot."
"Can not" means "it is possible not to," and "cannot" means "it is impossible to."
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Aug 1 14:20:32 2018 (r476182)
+++ head/security/vuxml/vuln.xml Wed Aug 1 16:32:58 2018 (r476183)
@@ -68619,7 +68619,7 @@ affected..</p>
driver to dereference an invalid pointer.</p>
<p>Although this has not been confirmed, the possibility that
an attacker may be able to execute arbitrary code in kernel
- context can not be ruled out.</p>
+ context cannot be ruled out.</p>
</body>
</description>
<references>
@@ -79852,7 +79852,7 @@ executed in your Internet Explorer while displaying th
<p>Problem description:</p>
<blockquote cite="http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc">
<p>There is a programming error in the DES implementation used in crypt()
- when handling input which contains characters that can not be represented
+ when handling input which contains characters that cannot be represented
with 7-bit ASCII.</p>
<p>When the input contains characters with only the most significant bit set
(0x80), that character and all characters after it will be ignored.</p>
@@ -89842,7 +89842,7 @@ executed in your Internet Explorer while displaying th
being too small, allowing it to be overwritten. The impact of this
programming error is that MaraDNS can be crashed by sending
MaraDNS a single "packet of death". Since the data placed in the
- overwritten array can not be remotely controlled (it is a list of
+ overwritten array cannot be remotely controlled (it is a list of
increasing integers), there is no way to increase privileges
exploiting this bug.</p>
</blockquote>
@@ -115625,7 +115625,7 @@ executed in your Internet Explorer while displaying th
RealMedia RTSP streams. When checking for matching asm rules, the code
stores the results in a fixed-size array, but no boundary checks are
performed. This may lead to a buffer overflow if the user is tricked
- into connecting to a malicious server. Since the attacker can not write
+ into connecting to a malicious server. Since the attacker cannot write
arbitrary data into the buffer, creating an exploit is very hard; but a
DoS attack is easily made.
A fix for this problem was committed to SVN on Sun Dec 31 13:27:53 2006
More information about the svn-ports-all
mailing list