diff options
author | Matthias Andree <mandree@FreeBSD.org> | 2023-04-13 20:10:39 +0000 |
---|---|---|
committer | Matthias Andree <mandree@FreeBSD.org> | 2023-04-13 20:10:39 +0000 |
commit | faeda4b7964f9ede5f12c7b29b2e53ecb6e4696a (patch) | |
tree | d59c89a691376c216557510a4ed8e5f7a85ef0cc | |
parent | 804fb156eb9767066a20f556a98cc353110aa921 (diff) | |
download | ports-faeda4b7964f9ede5f12c7b29b2e53ecb6e4696a.tar.gz ports-faeda4b7964f9ede5f12c7b29b2e53ecb6e4696a.zip |
security/vuxml: revise ghostscript vuln entry.
-rw-r--r-- | security/vuxml/vuln/2023.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index c3ca8728e446..4be97b68a6af 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,5 +1,5 @@ <vuln vid="25872b25-da2d-11ed-b715-a1e76793953b"> - <topic>ghostscript10 -- exploitable buffer overflow</topic> + <topic>ghostscript -- exploitable buffer overflow in (T)BCP in PS interpreter</topic> <affects> <package><name>ghostscript</name> <range><lt>10.01.0</lt></range></package> <package><name>ghostscript7-base</name><range><lt>10.01.0</lt></range></package> |