Date: Sun, 10 Mar 2013 04:03:12 +0000 (UTC) From: Martin Wilke <miwi@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r313798 - head/security/vuxml Message-ID: <201303100403.r2A43CZ7039155@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: miwi Date: Sun Mar 10 04:03:12 2013 New Revision: 313798 URL: http://svnweb.freebsd.org/changeset/ports/313798 Log: - Fix previous entry Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Mar 10 03:52:04 2013 (r313797) +++ head/security/vuxml/vuln.xml Sun Mar 10 04:03:12 2013 (r313798) @@ -64,12 +64,16 @@ Note: Please add new entries to the beg <p>Pidgin reports:</p> <blockquote cite="https://developer.pidgin.im/wiki/ChangeLog"> <p>libpurple</p> - <p> -- Fix a crash when receiving UPnP responses with abnormally long values. (CVE-2013-0274)</p> + <p>Fix a crash when receiving UPnP responses with abnormally long values.</p> <p>MXit</p> - <p> -- Fix two bugs where a remote MXit user could possibly specify a local file path to be written to. (CVE-2013-0271)</p> - <p> -- Fix a bug where the MXit server or a man-in-the-middle could potentially send specially crafted data that could overflow a buffer and lead to a crash or remote code execution. (CVE-2013-0272)</p> + <p>Fix two bugs where a remote MXit user could possibly specify a local file + path to be written to.</p> + <p>Fix a bug where the MXit server or a man-in-the-middle could potentially + send specially crafted data that could overflow a buffer and lead to a crash + or remote code execution.</p> <p>Sametime</p> - <p> -- Fix a crash in Sametime when a malicious server sends us an abnormally long user ID. (CVE-2013-0273)</p> + <p>Fix a crash in Sametime when a malicious server sends us an abnormally long + user ID.</p> </blockquote> </body> </description> @@ -416,8 +420,8 @@ Note: Please add new entries to the beg <body xmlns="http://www.w3.org/1999/xhtml"> <p>Mark Evans reports:</p> <blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo"> - <p>Unfortunately there is a security vulnerability in Dragonfly when - used with Rails which would potentially allow an attacker to run + <p>Unfortnately there is a security vulnerability in Dragonfly when + used with Rails which would potentially allow an attacker to run arbitrary code on a host machine using carefully crafted requests. </p>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201303100403.r2A43CZ7039155>