im.pidgin.www: f9bf3b5a4b0fc9d9b61530b999bbf81caf3ac6e9

rekkanoryo at rekkanoryo at
Wed Oct 24 14:30:40 EDT 2007

Revision: f9bf3b5a4b0fc9d9b61530b999bbf81caf3ac6e9
Ancestor: 7ec4675dc46d6837cdede41f2c6ef5a4811d5784
Author: rekkanoryo at
Date: 2007-10-24T18:26:42
Branch: im.pidgin.www

Modified files:


Fix my typo.

-------------- next part --------------
--- htdocs/news/security/index.php	e40f3ff2bad7d7cc9e421e3638bd6923b741c19c
+++ htdocs/news/security/index.php	ceef0a0e4d33a47fc265b682c484b5cd759191ae
@@ -261,7 +261,7 @@ $vulnerabilities = array(
 		"title"        => "NULL pointer dereference in parsing invalid HTML",
 		"date"         => "4 October 2007",
 		"cve"          => "CVE-2007-4999",
-		"summary"      => "Receiving invalid HTML cau cause libpurple 2.1.0 through 2.2.1 to crash",
+		"summary"      => "Receiving invalid HTML can cause libpurple 2.1.0 through 2.2.1 to crash",
 		"description"  => "A remote user can cause a denial of service (crash) by sending a message with invalid HTML.  It is believed that this crash can be triggered only when using HTML logging, and it requires the remote user to be able to send invalid HTML.  This is possible on AIM and may be possible on some XMPP networks.  Other protocols and networks may also be affected.",
 		"fix"          => "The affected function, purple_markup_html_to_xhtml(), has been patched to fix the vulnerability.",
 		"fixedversion" => "2.2.2",

More information about the Commits mailing list