aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2011-01-31 22:02:34 +0800
committermiwi <miwi@FreeBSD.org>2011-01-31 22:02:34 +0800
commit07c843f2452f5594a34b5acce770d7a504695b6d (patch)
tree678a50900a95e9df9fc4d73e9df7df8ddfdcb64f /security
parent5d1f14d27a7702afe249be5f81b2824cf41b425a (diff)
downloadfreebsd-ports-gnome-07c843f2452f5594a34b5acce770d7a504695b6d.tar.gz
freebsd-ports-gnome-07c843f2452f5594a34b5acce770d7a504695b6d.tar.zst
freebsd-ports-gnome-07c843f2452f5594a34b5acce770d7a504695b6d.zip
- Cleanup previous Entry
Feature safe: yes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml14
1 files changed, 7 insertions, 7 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8dec3d3b3fc3..aab316fc353b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,20 +47,20 @@ Note: Please add new entries to the beginning of this file.
<p>MaraDNS developer Sam Trenholme reports:</p>
<blockquote cite="http://samiam.org/blog/20110129.html">
<p>... a mistake in allocating an array of integers, allocating it
- in bytes instead of sizeof(int) units. This resulted in a buffer
+ in bytes instead of sizeof(int) units. This resulted in a buffer
being too small, allowing it to be overwritten. The impact of this
- programming error is that MaraDNS can be crashed by sending
- MaraDNS a single "packet of death". Since the data placed in the
- overwritten array can not be remotely controlled (it is a list of
- increasing integers), there is no way to increase privileges
+ programming error is that MaraDNS can be crashed by sending
+ MaraDNS a single "packet of death". Since the data placed in the
+ overwritten array can not be remotely controlled (it is a list of
+ increasing integers), there is no way to increase privileges
exploiting this bug.</p>
</blockquote>
</body>
</description>
<references>
<bid>45966</bid>
- <cvename>CVE-2011-0520</cvename>
- <url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834</url>
+ <cvename>CVE-2011-0520</cvename>
+ <url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834</url>
</references>
<dates>
<discovery>2011-01-23</discovery>