diff options
author | Kristian Fiskerstrand <k_f@gentoo.org> | 2016-06-18 21:12:11 +0200 |
---|---|---|
committer | Kristian Fiskerstrand <k_f@gentoo.org> | 2016-06-18 21:12:11 +0200 |
commit | 1514466934571e776e418335457dd8c99cff95f5 (patch) | |
tree | 7a496f0644928721e28bd112d810c3860e4cbba0 /glsa-201606-07.xml | |
parent | Add GLSA 201606-07 (diff) | |
download | glsa-1514466934571e776e418335457dd8c99cff95f5.tar.gz glsa-1514466934571e776e418335457dd8c99cff95f5.tar.bz2 glsa-1514466934571e776e418335457dd8c99cff95f5.zip |
glsa-201606-07: Fix typo
trigged -> triggered
Diffstat (limited to 'glsa-201606-07.xml')
-rw-r--r-- | glsa-201606-07.xml | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/glsa-201606-07.xml b/glsa-201606-07.xml index 9cc620dc..c589b40d 100644 --- a/glsa-201606-07.xml +++ b/glsa-201606-07.xml @@ -7,7 +7,7 @@ </synopsis> <product type="ebuild"></product> <announced>June 18, 2016</announced> - <revised>June 18, 2016: 1</revised> + <revised>June 18, 2016: 2</revised> <bug>571152</bug> <access>remote</access> <affected> @@ -20,7 +20,7 @@ <p>A fully featured, yet light weight RFC2131 compliant DHCP client</p> </background> <description> - <p>A heap overflow can be trigged via malformed DHCP responses in the + <p>A heap overflow can be triggered via malformed DHCP responses in the print_option (via dhcp_envoption1) due to incorrect option length values. These vulnerabilities could also allow remote attackers to trigger an invalid read/crash via malformed DHCP responses. @@ -47,5 +47,5 @@ <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1504">CVE-2016-1504</uri> </references> <metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:32:46 +0000">K_F</metadata> - <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 15:51:23 +0000">b-man</metadata> + <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 19:11:50 +0000">b-man</metadata> </glsa> |