Remotely exploitable buffer overflow; same code and impact as in

Security Advisory 00:61
This commit is contained in:
Kris Kennaway 2000-11-20 01:31:09 +00:00
parent 00e9cdadbc
commit 3150a57908
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=35274
2 changed files with 4 additions and 2 deletions

View File

@ -6,7 +6,7 @@
#
PORTNAME= ethereal
PORTVERSION= 0.8.10
PORTVERSION= 0.8.12
CATEGORIES= net ipv6
MASTER_SITES= http://alpha1.linuxberg.com/files/x11/network/ \
http://www.linuxberg.com/files/x11/network/ \
@ -15,6 +15,7 @@ MASTER_SITES= http://alpha1.linuxberg.com/files/x11/network/ \
http://ethereal.boehm.org/distribution/
MAINTAINER= billf@FreeBSD.org
FORBIDDEN= "Remotely exploitable buffer overflow; identical to Security Advisory 00:61"
USE_X_PREFIX= yes
USE_GTK= yes

View File

@ -6,7 +6,7 @@
#
PORTNAME= ethereal
PORTVERSION= 0.8.10
PORTVERSION= 0.8.12
CATEGORIES= net ipv6
MASTER_SITES= http://alpha1.linuxberg.com/files/x11/network/ \
http://www.linuxberg.com/files/x11/network/ \
@ -15,6 +15,7 @@ MASTER_SITES= http://alpha1.linuxberg.com/files/x11/network/ \
http://ethereal.boehm.org/distribution/
MAINTAINER= billf@FreeBSD.org
FORBIDDEN= "Remotely exploitable buffer overflow; identical to Security Advisory 00:61"
USE_X_PREFIX= yes
USE_GTK= yes