Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 453420 Details for
Bug 599942
GLSA 201611-05: bad format of the XML, warning in glsa-check?
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
patch to GLSA 201611-05
glsa-201611-05.xml.patch (text/plain), 908 bytes, created by
Kalin KOZHUHAROV
on 2016-11-16 05:09:20 UTC
(
hide
)
Description:
patch to GLSA 201611-05
Filename:
MIME Type:
Creator:
Kalin KOZHUHAROV
Created:
2016-11-16 05:09:20 UTC
Size:
908 bytes
patch
obsolete
>--- a/usr/portage/metadata/glsa/glsa-201611-05.xml 2016-11-16 14:03:26.281980511 +0900 >+++ b/usr/portage/metadata/glsa/glsa-201611-05.xml 2016-11-16 14:02:54.704313675 +0900 >@@ -20,16 +20,10 @@ > <p>tnftp is a NetBSD FTP client with several advanced features.</p> > </background> > <description> >- <table> >- <tbody> >- <tr> >- <td>The fetch_url function in usr.bin/ftp/fetch.c allows remote >- attackers to execute arbitrary commands via a >- </td> >- <td>(pipe) character at the end of an HTTP redirect.</td> >- </tr> >- </tbody> >- </table> >+ <p>The fetch_url function in usr.bin/ftp/fetch.c allows remote attackers >+ to execute arbitrary commands via a (pipe) character at the end of an HTTP >+ redirect. >+ </p> > </description> > <impact type="normal"> > <p>A remote attacker could possibly execute arbitrary code with the
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 599942
: 453420