Date: Tue, 13 May 2014 01:55:46 +0000 (UTC) From: Akinori MUSHA <knu@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r353909 - head/security/vuxml Message-ID: <201405130155.s4D1tk4U083506@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: knu Date: Tue May 13 01:55:45 2014 New Revision: 353909 URL: http://svnweb.freebsd.org/changeset/ports/353909 QAT: https://qat.redports.org/buildarchive/r353909/ Log: Summary: Fix a typo copied from the original report. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue May 13 01:49:51 2014 (r353908) +++ head/security/vuxml/vuln.xml Tue May 13 01:55:45 2014 (r353909) @@ -58,7 +58,7 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="efdd0edc-da3d-11e3-9ecb-2c4138874f7d"> - <topic>libxml2 -- entity substituton DoS</topic> + <topic>libxml2 -- entity substitution DoS</topic> <affects> <package> <name>libxml2</name> @@ -71,7 +71,7 @@ Notes: <blockquote cite="http://www.openwall.com/lists/oss-security/2014/05/06/4"> <p>It was discovered that libxml2, a library providing support to read, modify and write XML files, incorrectly - performs entity substituton in the doctype prolog, even if + performs entity substitution in the doctype prolog, even if the application using libxml2 disabled any entity substitution. A remote attacker could provide a specially-crafted XML file that, when processed, would lead
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201405130155.s4D1tk4U083506>