diff options
author | Ruslan Makhmatkhanov <rm@FreeBSD.org> | 2012-06-21 12:02:28 +0000 |
---|---|---|
committer | Ruslan Makhmatkhanov <rm@FreeBSD.org> | 2012-06-21 12:02:28 +0000 |
commit | a81f50c1fb96020aa4bc393e08867420d602b0dd (patch) | |
tree | 654bb3a7169061ea189850ed854763329301bbed /security | |
parent | ad3fcdfe673870af1f9da29f172c79bbb7a86235 (diff) | |
download | ports-a81f50c1fb96020aa4bc393e08867420d602b0dd.tar.gz ports-a81f50c1fb96020aa4bc393e08867420d602b0dd.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3a55f76d0635..1e464f3829ce 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -1125,7 +1125,7 @@ Note: Please add new entries to the beginning of this file. <p>The release of PHP 5.4.13 and 5.4.3 complete a fix for the vulnerability in CGI-based setups as originally described in CVE-2012-1823. (CVE-2012-2311)</p> - <p>Note: mod_php and php-fqm are not vulnerable to this attack.</p> + <p>Note: mod_php and php-fpm are not vulnerable to this attack.</p> <p>PHP 5.4.3 fixes a buffer overflow vulnerability in the apache_request_headers() (CVE-2012-2329).</p> </blockquote> |