summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKristian Fiskerstrand <k_f@gentoo.org>2016-06-18 21:12:11 +0200
committerKristian Fiskerstrand <k_f@gentoo.org>2016-06-18 21:12:11 +0200
commit1514466934571e776e418335457dd8c99cff95f5 (patch)
tree7a496f0644928721e28bd112d810c3860e4cbba0 /glsa-201606-07.xml
parentAdd GLSA 201606-07 (diff)
downloadglsa-1514466934571e776e418335457dd8c99cff95f5.tar.gz
glsa-1514466934571e776e418335457dd8c99cff95f5.tar.bz2
glsa-1514466934571e776e418335457dd8c99cff95f5.zip
glsa-201606-07: Fix typo
trigged -> triggered
Diffstat (limited to 'glsa-201606-07.xml')
-rw-r--r--glsa-201606-07.xml6
1 files changed, 3 insertions, 3 deletions
diff --git a/glsa-201606-07.xml b/glsa-201606-07.xml
index 9cc620dc..c589b40d 100644
--- a/glsa-201606-07.xml
+++ b/glsa-201606-07.xml
@@ -7,7 +7,7 @@
</synopsis>
<product type="ebuild"></product>
<announced>June 18, 2016</announced>
- <revised>June 18, 2016: 1</revised>
+ <revised>June 18, 2016: 2</revised>
<bug>571152</bug>
<access>remote</access>
<affected>
@@ -20,7 +20,7 @@
<p>A fully featured, yet light weight RFC2131 compliant DHCP client</p>
</background>
<description>
- <p>A heap overflow can be trigged via malformed DHCP responses in the
+ <p>A heap overflow can be triggered via malformed DHCP responses in the
print_option (via dhcp_envoption1) due to incorrect option length values.
These vulnerabilities could also allow remote attackers to trigger an
invalid read/crash via malformed DHCP responses.
@@ -47,5 +47,5 @@
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1504">CVE-2016-1504</uri>
</references>
<metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:32:46 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 15:51:23 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 19:11:50 +0000">b-man</metadata>
</glsa>