aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorDag-Erling Smørgrav <des@FreeBSD.org>2004-07-02 09:13:07 +0000
committerDag-Erling Smørgrav <des@FreeBSD.org>2004-07-02 09:13:07 +0000
commit6d13563f98bfef7127fd1103af3a77ca46266fdd (patch)
treeb3fe12c867b690eb5da9e890c903d9eba6e5d881 /security
parent7e3372e221ce3a3d850b4709272fac8714fef81d (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 18 insertions, 18 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index a3b4ba5a7e21..2d3078ac0698 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -43,9 +43,9 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A programming error in the handling of some Linux system
- calls may result in memory locations being accessed without
- proper validation.</p>
+ <p>A programming error in the handling of some Linux system
+ calls may result in memory locations being accessed without
+ proper validation.</p>
<p>It may be possible for a local attacker to read and/or
overwrite portions of kernel memory, resulting in disclosure
of sensitive information or potential privilege escalation.
@@ -66,17 +66,17 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<topic>XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0</topic>
<affects>
<package>
- <name>xorg-clients</name>
- <range><eq>6.7.0</eq></range>
+ <name>xorg-clients</name>
+ <range><eq>6.7.0</eq></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>When the IPv6 code was added to xdm a critical
- test to disable xdmcp was accidentally removed. This
- caused xdm to create the chooser socket regardless if
- DisplayManager.requestPort was disabled in xdm-config
- or not.</p>
+ <p>When the IPv6 code was added to xdm a critical
+ test to disable xdmcp was accidentally removed. This
+ caused xdm to create the chooser socket regardless if
+ DisplayManager.requestPort was disabled in xdm-config
+ or not.</p>
</body>
</description>
<references>
@@ -95,13 +95,13 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<topic>MoinMoin administrative group name privilege escalation vulnerability</topic>
<affects>
<package>
- <name>moinmoin</name>
- <range><lt>1.2.2</lt></range>
+ <name>moinmoin</name>
+ <range><lt>1.2.2</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A serious flaw exists in the MoinMoin software
+ <p>A serious flaw exists in the MoinMoin software
which may allow a malicious user to gain access to
unauthorized privileges.</p>
</body>
@@ -119,13 +119,13 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<topic>isc-dhcp3-server buffer overflow in logging mechanism</topic>
<affects>
<package>
- <name>isc-dhcp3-{relay,server}</name>
- <range><ge>3.0.1.r12</ge><lt>3.0.1.r14</lt></range>
+ <name>isc-dhcp3-{relay,server}</name>
+ <range><ge>3.0.1.r12</ge><lt>3.0.1.r14</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A buffer overflow exists in the logging functionality
+ <p>A buffer overflow exists in the logging functionality
of the DHCP daemon which could lead to Denial of Service
attacks and has the potential to allow attackers to
execute arbitrary code.</p>
@@ -187,7 +187,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>A flaw exists in Gallery versions previous to
+ <p>A flaw exists in Gallery versions previous to
1.4.3-pl1 and post 1.2 which may give an attacker
the potential to log in under the "admin" account.
Data outside of the gallery is unaffected and the
@@ -205,7 +205,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<entry>2004-06-24</entry>
</dates>
</vuln>
-
+
<vuln vid="6f955451-ba54-11d8-b88c-000d610a3b12">
<topic>Buffer overflow in Squid NTLM authentication helper</topic>
<affects>