aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorrea <rea@FreeBSD.org>2014-12-24 05:24:55 +0800
committerrea <rea@FreeBSD.org>2014-12-24 05:24:55 +0800
commit76a3ff34a40d25523a42d9712facbf46dbcd0bd8 (patch)
tree5dc4639dd4dae85d6d80adf57f107cbc864ae380 /security
parentdc88b86a223ba7d70073f5306601075e8c03828e (diff)
downloadfreebsd-ports-gnome-76a3ff34a40d25523a42d9712facbf46dbcd0bd8.tar.gz
freebsd-ports-gnome-76a3ff34a40d25523a42d9712facbf46dbcd0bd8.tar.zst
freebsd-ports-gnome-76a3ff34a40d25523a42d9712facbf46dbcd0bd8.zip
Fix whitespace in entry for ntp (4033d826-87dd-11e4-9079-3c970e169bc2)
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e0c5be3c0698..2eab3a0f24b6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -119,7 +119,7 @@ Notes:
be executed. ntp-keygen prior to version 4.2.7p230
also uses a non-cryptographic random number generator
when generating symmetric keys.</p>
- <p>The buffer overflow vulnerabilities in ntpd may
+ <p>The buffer overflow vulnerabilities in ntpd may
allow a remote unauthenticated attacker to execute
arbitrary malicious code with the privilege level
of the ntpd process. The weak default key and