diff options
author | rea <rea@FreeBSD.org> | 2014-12-24 05:24:55 +0800 |
---|---|---|
committer | rea <rea@FreeBSD.org> | 2014-12-24 05:24:55 +0800 |
commit | 76a3ff34a40d25523a42d9712facbf46dbcd0bd8 (patch) | |
tree | 5dc4639dd4dae85d6d80adf57f107cbc864ae380 /security | |
parent | dc88b86a223ba7d70073f5306601075e8c03828e (diff) | |
download | freebsd-ports-gnome-76a3ff34a40d25523a42d9712facbf46dbcd0bd8.tar.gz freebsd-ports-gnome-76a3ff34a40d25523a42d9712facbf46dbcd0bd8.tar.zst freebsd-ports-gnome-76a3ff34a40d25523a42d9712facbf46dbcd0bd8.zip |
Fix whitespace in entry for ntp (4033d826-87dd-11e4-9079-3c970e169bc2)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e0c5be3c0698..2eab3a0f24b6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -119,7 +119,7 @@ Notes: be executed. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys.</p> - <p>The buffer overflow vulnerabilities in ntpd may + <p>The buffer overflow vulnerabilities in ntpd may allow a remote unauthenticated attacker to execute arbitrary malicious code with the privilege level of the ntpd process. The weak default key and |