Date: Wed, 1 Aug 2018 16:32:58 +0000 (UTC) From: Adam Weinberger <adamw@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r476183 - head/security/vuxml Message-ID: <201808011632.w71GWwft054607@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: adamw Date: Wed Aug 1 16:32:58 2018 New Revision: 476183 URL: https://svnweb.freebsd.org/changeset/ports/476183 Log: Fix a common grammar error: "can not" means the opposite of "cannot." "Can not" means "it is possible not to," and "cannot" means "it is impossible to." Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Aug 1 14:20:32 2018 (r476182) +++ head/security/vuxml/vuln.xml Wed Aug 1 16:32:58 2018 (r476183) @@ -68619,7 +68619,7 @@ affected..</p> driver to dereference an invalid pointer.</p> <p>Although this has not been confirmed, the possibility that an attacker may be able to execute arbitrary code in kernel - context can not be ruled out.</p> + context cannot be ruled out.</p> </body> </description> <references> @@ -79852,7 +79852,7 @@ executed in your Internet Explorer while displaying th <p>Problem description:</p> <blockquote cite="http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc"> <p>There is a programming error in the DES implementation used in crypt() - when handling input which contains characters that can not be represented + when handling input which contains characters that cannot be represented with 7-bit ASCII.</p> <p>When the input contains characters with only the most significant bit set (0x80), that character and all characters after it will be ignored.</p> @@ -89842,7 +89842,7 @@ executed in your Internet Explorer while displaying th being too small, allowing it to be overwritten. The impact of this programming error is that MaraDNS can be crashed by sending MaraDNS a single "packet of death". Since the data placed in the - overwritten array can not be remotely controlled (it is a list of + overwritten array cannot be remotely controlled (it is a list of increasing integers), there is no way to increase privileges exploiting this bug.</p> </blockquote> @@ -115625,7 +115625,7 @@ executed in your Internet Explorer while displaying th RealMedia RTSP streams. When checking for matching asm rules, the code stores the results in a fixed-size array, but no boundary checks are performed. This may lead to a buffer overflow if the user is tricked - into connecting to a malicious server. Since the attacker can not write + into connecting to a malicious server. Since the attacker cannot write arbitrary data into the buffer, creating an exploit is very hard; but a DoS attack is easily made. A fix for this problem was committed to SVN on Sun Dec 31 13:27:53 2006
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201808011632.w71GWwft054607>