aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authordes <des@FreeBSD.org>2004-07-02 17:13:07 +0800
committerdes <des@FreeBSD.org>2004-07-02 17:13:07 +0800
commitd1cf56ef86bf45416c00db7216fa40a4a873114f (patch)
tree26827473cbcff6af6320f37a87727460406c4616 /security
parent5951143cfaff88469b7a34ec45f115ce4f12c30e (diff)
downloadfreebsd-ports-gnome-d1cf56ef86bf45416c00db7216fa40a4a873114f.tar.gz
freebsd-ports-gnome-d1cf56ef86bf45416c00db7216fa40a4a873114f.tar.zst
freebsd-ports-gnome-d1cf56ef86bf45416c00db7216fa40a4a873114f.zip
Whitespace cleanup.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 18 insertions, 18 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index a3b4ba5a7e21..2d3078ac0698 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -43,9 +43,9 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A programming error in the handling of some Linux system
- calls may result in memory locations being accessed without
- proper validation.</p>
+ <p>A programming error in the handling of some Linux system
+ calls may result in memory locations being accessed without
+ proper validation.</p>
<p>It may be possible for a local attacker to read and/or
overwrite portions of kernel memory, resulting in disclosure
of sensitive information or potential privilege escalation.
@@ -66,17 +66,17 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<topic>XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0</topic>
<affects>
<package>
- <name>xorg-clients</name>
- <range><eq>6.7.0</eq></range>
+ <name>xorg-clients</name>
+ <range><eq>6.7.0</eq></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>When the IPv6 code was added to xdm a critical
- test to disable xdmcp was accidentally removed. This
- caused xdm to create the chooser socket regardless if
- DisplayManager.requestPort was disabled in xdm-config
- or not.</p>
+ <p>When the IPv6 code was added to xdm a critical
+ test to disable xdmcp was accidentally removed. This
+ caused xdm to create the chooser socket regardless if
+ DisplayManager.requestPort was disabled in xdm-config
+ or not.</p>
</body>
</description>
<references>
@@ -95,13 +95,13 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<topic>MoinMoin administrative group name privilege escalation vulnerability</topic>
<affects>
<package>
- <name>moinmoin</name>
- <range><lt>1.2.2</lt></range>
+ <name>moinmoin</name>
+ <range><lt>1.2.2</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A serious flaw exists in the MoinMoin software
+ <p>A serious flaw exists in the MoinMoin software
which may allow a malicious user to gain access to
unauthorized privileges.</p>
</body>
@@ -119,13 +119,13 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<topic>isc-dhcp3-server buffer overflow in logging mechanism</topic>
<affects>
<package>
- <name>isc-dhcp3-{relay,server}</name>
- <range><ge>3.0.1.r12</ge><lt>3.0.1.r14</lt></range>
+ <name>isc-dhcp3-{relay,server}</name>
+ <range><ge>3.0.1.r12</ge><lt>3.0.1.r14</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A buffer overflow exists in the logging functionality
+ <p>A buffer overflow exists in the logging functionality
of the DHCP daemon which could lead to Denial of Service
attacks and has the potential to allow attackers to
execute arbitrary code.</p>
@@ -187,7 +187,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A flaw exists in Gallery versions previous to
+ <p>A flaw exists in Gallery versions previous to
1.4.3-pl1 and post 1.2 which may give an attacker
the potential to log in under the "admin" account.
Data outside of the gallery is unaffected and the
@@ -205,7 +205,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<entry>2004-06-24</entry>
</dates>
</vuln>
-
+
<vuln vid="6f955451-ba54-11d8-b88c-000d610a3b12">
<topic>Buffer overflow in Squid NTLM authentication helper</topic>
<affects>