diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2008-10-28 21:04:29 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2008-10-28 21:04:29 +0000 |
commit | 1829ed7be967af18461e310e2685307ba2908a02 (patch) | |
tree | 497805883afe9b3d8083241e74fba818c60acf65 /security | |
parent | 43bbd4d5db739a44389a901cd7091580229c37be (diff) | |
download | ports-1829ed7be967af18461e310e2685307ba2908a02.tar.gz ports-1829ed7be967af18461e310e2685307ba2908a02.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 386f779aff2e..7c7724e94a0e 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -94,9 +94,9 @@ Note: Please add new entries to the beginning of this file. <p>CVE reports:</p> <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469"> <p>Heap-based buffer overflow in the SPF_dns_resolv_lookup function - in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers - to execute arbitrary code via a long DNS TXT record with a modified - length field.</p> + in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers + to execute arbitrary code via a long DNS TXT record with a modified + length field.</p> </blockquote> </body> </description> |