aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2009-01-03 20:35:32 +0800
committermiwi <miwi@FreeBSD.org>2009-01-03 20:35:32 +0800
commit856731120e9ec0540fe6a7e1dbee5b25cc90db3f (patch)
treee7a7e5a376dc3cc1d8d5b23b03fab38998868420 /security/vuxml
parent402f6a432f0f902eb0e6b195107a8142ae025f79 (diff)
downloadfreebsd-ports-gnome-856731120e9ec0540fe6a7e1dbee5b25cc90db3f.tar.gz
freebsd-ports-gnome-856731120e9ec0540fe6a7e1dbee5b25cc90db3f.tar.zst
freebsd-ports-gnome-856731120e9ec0540fe6a7e1dbee5b25cc90db3f.zip
- Cleanup (fix whitespaces, typos)
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml25
1 files changed, 12 insertions, 13 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 2d52d0b504e7..da39d9d9152d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -46,13 +46,12 @@ Note: Please add new entries to the beginning of this file.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Jan Lieskovsky reports:</p>
- <blockquote
- cite="http://www.openwall.com/lists/oss-security/2008/11/28/1">
- <p>perl-File-Path rmtree race condition (CVE-2005-0448 was
- assigned to address this)</p>
- <p>This vulnerability was fixed in 5.8.4-7 but re-introduced
- in 5.8.8-1. It's also present in File::Path 2.xx, up to and
- including 2.07 which has only a partial fix.</p>
+ <blockquote cite="http://www.openwall.com/lists/oss-security/2008/11/28/1">
+ <p>perl-File-Path rmtree race condition (CVE-2005-0448 was assigned to
+ address this)</p>
+ <p>This vulnerability was fixed in 5.8.4-7 but re-introduced
+ in 5.8.8-1. It's also present in File::Path 2.xx, up to and
+ including 2.07 which has only a partial fix.</p>
</blockquote>
</body>
</description>
@@ -128,13 +127,13 @@ Note: Please add new entries to the beginning of this file.
<blockquote
cite="http://www.coresecurity.com/content/vinagre-format-string">
<p>A format string error has been found on the
- vinagre_utils_show_error() function that can be exploited via
- commands issued from a malicious server containing format
- string specifiers on the VNC name.</p>
+ vinagre_utils_show_error() function that can be exploited via
+ commands issued from a malicious server containing format
+ string specifiers on the VNC name.</p>
<p>In a web based attack scenario, the user would be required
- to connect to a malicious server. Successful exploitation
- would then allow the attacker to execute arbitrary code with
- the privileges of the Vinagre user.</p>
+ to connect to a malicious server. Successful exploitation
+ would then allow the attacker to execute arbitrary code with
+ the privileges of the Vinagre user.</p>
</blockquote>
</body>
</description>