Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Apr 2023 20:14:35 GMT
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: faeda4b7964f - main - security/vuxml: revise ghostscript vuln entry.
Message-ID:  <202304132014.33DKEZkV030992@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by mandree:

URL: https://cgit.FreeBSD.org/ports/commit/?id=faeda4b7964f9ede5f12c7b29b2e53ecb6e4696a

commit faeda4b7964f9ede5f12c7b29b2e53ecb6e4696a
Author:     Matthias Andree <mandree@FreeBSD.org>
AuthorDate: 2023-04-13 20:10:39 +0000
Commit:     Matthias Andree <mandree@FreeBSD.org>
CommitDate: 2023-04-13 20:10:39 +0000

    security/vuxml: revise ghostscript vuln entry.
---
 security/vuxml/vuln/2023.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index c3ca8728e446..4be97b68a6af 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,5 +1,5 @@
   <vuln vid="25872b25-da2d-11ed-b715-a1e76793953b">
-    <topic>ghostscript10 -- exploitable buffer overflow</topic>
+    <topic>ghostscript -- exploitable buffer overflow in (T)BCP in PS interpreter</topic>
     <affects>
       <package><name>ghostscript</name> <range><lt>10.01.0</lt></range></package>
       <package><name>ghostscript7-base</name><range><lt>10.01.0</lt></range></package>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202304132014.33DKEZkV030992>