aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-05-04 04:15:32 +0800
committernectar <nectar@FreeBSD.org>2004-05-04 04:15:32 +0800
commit05ddda966cae2ef31327c813327410833a66cb87 (patch)
tree52b7fcb46a31296b4c202e9fc53d641b69ed9434
parentc0ee574419d0a46689f81853aabe15a31c3dfcde (diff)
downloadfreebsd-ports-gnome-05ddda966cae2ef31327c813327410833a66cb87.tar.gz
freebsd-ports-gnome-05ddda966cae2ef31327c813327410833a66cb87.tar.zst
freebsd-ports-gnome-05ddda966cae2ef31327c813327410833a66cb87.zip
Correct package name for xchat Socks5 vulnerability (xchat -> xchat2).
Note that the issue is fixed in version 2.0.8_2 (thanks marcus!).
-rw-r--r--security/vuxml/vuln.xml5
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 05c5a942f2e7..cca72ddefa17 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -239,8 +239,8 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<topic>xchat remotely exploitable buffer overflow (Socks5)</topic>
<affects>
<package>
- <name>xchat</name>
- <range><ge>1.8</ge><lt>2.0.9</lt></range>
+ <name>xchat2</name>
+ <range><ge>1.8</ge><lt>2.0.8_2</lt></range>
</package>
</affects>
<description>
@@ -262,6 +262,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<dates>
<discovery>2004-04-05</discovery>
<entry>2004-04-23</entry>
+ <modified>2004-05-03</modified>
</dates>
</vuln>