diff options
author | nectar <nectar@FreeBSD.org> | 2004-05-04 04:15:32 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2004-05-04 04:15:32 +0800 |
commit | 05ddda966cae2ef31327c813327410833a66cb87 (patch) | |
tree | 52b7fcb46a31296b4c202e9fc53d641b69ed9434 | |
parent | c0ee574419d0a46689f81853aabe15a31c3dfcde (diff) | |
download | freebsd-ports-gnome-05ddda966cae2ef31327c813327410833a66cb87.tar.gz freebsd-ports-gnome-05ddda966cae2ef31327c813327410833a66cb87.tar.zst freebsd-ports-gnome-05ddda966cae2ef31327c813327410833a66cb87.zip |
Correct package name for xchat Socks5 vulnerability (xchat -> xchat2).
Note that the issue is fixed in version 2.0.8_2 (thanks marcus!).
-rw-r--r-- | security/vuxml/vuln.xml | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 05c5a942f2e7..cca72ddefa17 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -239,8 +239,8 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <topic>xchat remotely exploitable buffer overflow (Socks5)</topic> <affects> <package> - <name>xchat</name> - <range><ge>1.8</ge><lt>2.0.9</lt></range> + <name>xchat2</name> + <range><ge>1.8</ge><lt>2.0.8_2</lt></range> </package> </affects> <description> @@ -262,6 +262,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <dates> <discovery>2004-04-05</discovery> <entry>2004-04-23</entry> + <modified>2004-05-03</modified> </dates> </vuln> |