From owner-svn-ports-head@FreeBSD.ORG Tue Dec 23 21:24:56 2014
Return-Path:
Delivered-To: svn-ports-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id AB9562FD;
Tue, 23 Dec 2014 21:24:56 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 97BC935A4;
Tue, 23 Dec 2014 21:24:56 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id sBNLOuiq054603;
Tue, 23 Dec 2014 21:24:56 GMT (envelope-from rea@FreeBSD.org)
Received: (from rea@localhost)
by svn.freebsd.org (8.14.9/8.14.9/Submit) id sBNLOunY054602;
Tue, 23 Dec 2014 21:24:56 GMT (envelope-from rea@FreeBSD.org)
Message-Id: <201412232124.sBNLOunY054602@svn.freebsd.org>
X-Authentication-Warning: svn.freebsd.org: rea set sender to rea@FreeBSD.org
using -f
From: Eygene Ryabinkin
Date: Tue, 23 Dec 2014 21:24:56 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r375358 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-head@freebsd.org
X-Mailman-Version: 2.1.18-1
Precedence: list
List-Id: SVN commit messages for the ports tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 23 Dec 2014 21:24:56 -0000
Author: rea
Date: Tue Dec 23 21:24:55 2014
New Revision: 375358
URL: https://svnweb.freebsd.org/changeset/ports/375358
QAT: https://qat.redports.org/buildarchive/r375358/
Log:
Fix whitespace in entry for ntp (4033d826-87dd-11e4-9079-3c970e169bc2)
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Dec 23 21:22:35 2014 (r375357)
+++ head/security/vuxml/vuln.xml Tue Dec 23 21:24:55 2014 (r375358)
@@ -119,7 +119,7 @@ Notes:
be executed. ntp-keygen prior to version 4.2.7p230
also uses a non-cryptographic random number generator
when generating symmetric keys.
- The buffer overflow vulnerabilities in ntpd may
+
The buffer overflow vulnerabilities in ntpd may
allow a remote unauthenticated attacker to execute
arbitrary malicious code with the privilege level
of the ntpd process. The weak default key and