From 4305b73ead723e60d39e147b95439a04f3534d33 Mon Sep 17 00:00:00 2001 From: Martin Wilke Date: Thu, 31 May 2012 16:53:12 +0000 Subject: [PATCH] - Fix formating in previous entrys --- security/vuxml/vuln.xml | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2ac500bfd140..68ab91486354 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -69,16 +69,16 @@ Note: Please add new entries to the beginning of this file.

The PostgreSQL Global Development Group reports:

Today the PHP, OpenBSD and FreeBSD communities announced updates to - patch a security hole involving their crypt() hashing algorithms. This - issue is described in CVE-2012-2143. This vulnerability also affects a - minority of PostgreSQL users, and will be fixed in an update release on - June 4, 2012.

+ patch a security hole involving their crypt() hashing algorithms. This + issue is described in CVE-2012-2143. This vulnerability also affects a + minority of PostgreSQL users, and will be fixed in an update release on + June 4, 2012.

Affected users are those who use the crypt(text, text) function - with DES encryption in the optional pg_crypto module. Passwords - affected are those that contain characters that cannot be - represented with 7-bit ASCII. If a password contains a character - that has the most significant bit set (0x80), and DES encryption - is used, that character and all characters after it will be ignored.

+ with DES encryption in the optional pg_crypto module. Passwords + affected are those that contain characters that cannot be + represented with 7-bit ASCII. If a password contains a character + that has the most significant bit set (0x80), and DES encryption + is used, that character and all characters after it will be ignored.