www: ec670188: I like good grammar...

qulogic at pidgin.im qulogic at pidgin.im
Fri May 22 00:30:56 EDT 2009


-----------------------------------------------------------------
Revision: ec670188702bdcf9ac85481cdbf142750ac2f3e8
Ancestor: 8b8747e20d4a4c559d185da8d17878d02d9b1741
Author: qulogic at pidgin.im
Date: 2009-05-22T04:25:48
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/ec670188702bdcf9ac85481cdbf142750ac2f3e8

Modified files:
        htdocs/news/security/index.php

ChangeLog: 

I like good grammar...

-------------- next part --------------
============================================================
--- htdocs/news/security/index.php	98a3c94c6760d7d0be086b5b78f3f83298b64d94
+++ htdocs/news/security/index.php	8ca6374af758d1fef0f1e2ef28835ead19a3ba8a
@@ -323,8 +323,8 @@ $vulnerabilities = array(
 		"date"         => "3 May 2009",
 		"cve"          => "CVE-2009-1374",
 		"summary"      => "Possible remote denial of service when receiving a QQ packet",
-		"description"  => "decrypt_out() always writes 8 bytes past the passed in buffer, which is always allocated on the stack. We don't believe this can cause anything outside of a crash.",
-		"fix"          => "decrypt_out() is fixed to not write past the buffer.",
+		"description"  => "decrypt_out() always writes 8 bytes past the supplied buffer, which is always allocated on the stack. We don't believe this can cause anything outside of a crash.",
+		"fix"          => "decrypt_out() is fixed to not write past the end of the buffer.",
 		"fixedversion" => "2.5.6",
 		"discoveredby" => "Ka-Hing Cheung"
 	),
@@ -333,8 +333,8 @@ $vulnerabilities = array(
 		"date"         => "20 Mar 2009",
 		"cve"          => "CVE-2009-1375",
 		"summary"      => "Remote denial of service that affects several protocols",
-		"description"  => "A buffer maintained by PurpleCircBuffer may be corrupted if it's exactly full and then more bytes are added to it, leading to a crash. This structure is used by XMPP and Sametime protocol plugins",
-		"fix"          => "PurpleCircBuffer now does bounds check correctly",
+		"description"  => "A buffer maintained by PurpleCircBuffer may be corrupted if it's exactly full and then more bytes are added to it, leading to a crash. This structure is used by the XMPP and Sametime protocol plugins.",
+		"fix"          => "PurpleCircBuffer now correctly checks bounds.",
 		"fixedversion" => "2.5.6",
 		"discoveredby" => "Josef Andrysek"
 	),
@@ -343,8 +343,8 @@ $vulnerabilities = array(
 		"date"         => "2 May 2009",
 		"cve"          => "CVE-2009-1376",
 		"summary"      => "Malformed SLP messages can cause a buffer overflow",
-		"description"  => "The previous fix to <a href=\"/news/security/?id=25\">CVE-2008-2927</a> was deemed incomplete. The size check improperly casted an uint64 to size_t which can cause an integer overflow, rendering the check useless.",
-		"fix"          => "Proper variable type is now used when doing size comparison. Additionally the malformed message is now properly discarded.",
+		"description"  => "The previous fix to <a href=\"/news/security/?id=25\">CVE-2008-2927</a> was deemed incomplete. The size check improperly cast an uint64 to size_t which can cause an integer overflow, rendering the check useless.",
+		"fix"          => "The proper variable type is now used when doing size comparison. Additionally, the malformed message is now properly discarded.",
 		"fixedversion" => "2.5.6",
 		"discoveredby" => ""
 	)


More information about the Commits mailing list