aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorwxs <wxs@FreeBSD.org>2009-05-22 21:15:21 +0800
committerwxs <wxs@FreeBSD.org>2009-05-22 21:15:21 +0800
commit400870d8e9ed201c82828323f690a5f858382c34 (patch)
tree3f78063959cb8c388b7ad9204e5e643ed7bd84ed /security
parent3d8bf8e0597a55ef4e1b4192fb3752cbcdc05db3 (diff)
downloadfreebsd-ports-gnome-400870d8e9ed201c82828323f690a5f858382c34.tar.gz
freebsd-ports-gnome-400870d8e9ed201c82828323f690a5f858382c34.tar.zst
freebsd-ports-gnome-400870d8e9ed201c82828323f690a5f858382c34.zip
- Add CVE information for nsd overflow.
- s/over flow/overflow/ for the same entry. Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> (private mail)
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml3
1 files changed, 2 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e38acf6fed40..62c11663ed9a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -79,7 +79,7 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>NLnet Labs:</p>
<blockquote cite="http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html">
- <p>A one-byte buffer over flow has been reported in NSD. The
+ <p>A one-byte buffer overflow has been reported in NSD. The
problem affects all versions 2.0.0 to 3.2.1. The bug allows
a carefully crafted exploit to bring down your DNS server. It
is highly unlikely that this one byte overflow can lead to
@@ -88,6 +88,7 @@ Note: Please add new entries to the beginning of this file.
</body>
</description>
<references>
+ <cvename>CVE-2009-1755</cvename>
<url>http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html</url>
</references>
<dates>