Date: Fri, 16 Feb 2018 15:43:37 +0000 (UTC) From: Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r462043 - head/security/vuxml Message-ID: <201802161543.w1GFhbTD066442@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: sunpoet Date: Fri Feb 16 15:43:37 2018 New Revision: 462043 URL: https://svnweb.freebsd.org/changeset/ports/462043 Log: Fix typo Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Feb 16 15:43:32 2018 (r462042) +++ head/security/vuxml/vuln.xml Fri Feb 16 15:43:37 2018 (r462043) @@ -7206,7 +7206,7 @@ Using a handcrafted message, remote code execution see <p>GNOME reports:</p> <blockquote cite="https://bugzilla.gnome.org/show_bug.cgi?id=784630"> <p>The comic book backend in evince 3.24.0 (and earlier) is vulnerable to a command injection bug that can be used to execute arbitrary commands when a CBT file is opened.</p> - <p>The same vulnerabilty affects atril, the Evince fork.</p> + <p>The same vulnerability affects atril, the Evince fork.</p> </blockquote> </body> </description> @@ -26147,7 +26147,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="7da1da96-24bb-11e6-bd31-3065ec8fd3ec"> - <topic>chromium -- multiple vulnerablities</topic> + <topic>chromium -- multiple vulnerabilities</topic> <affects> <package> <name>chromium</name>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201802161543.w1GFhbTD066442>