Date: Wed, 27 Jul 2016 22:34:52 +0200 From: Bjorn Carlsson <bc@skogen.nu> To: freebsd-ports-bugs@freebsd.org Subject: Oh no! Message-ID: <1469651692.10602.13.camel@newlap.skogen.nu>
next in thread | raw e-mail | index | archive | help
===>>> All >> libgd-2.1.1,1 >> tiff-4.0.6_1 (12/15) ===> Cleaning for tiff-4.0.6_2 ===> tiff-4.0.6_2 has known vulnerabilities: tiff-4.0.6_2 is vulnerable: tiff -- buffer overflow CVE: CVE-2016-5102 WWW: https://vuxml.FreeBSD.org/freebsd/c17fe91d-4aa6-11e6-a7bd-14dae9d210b8.html 1 problem(s) in the installed packages found. => Please update your ports tree and try again. => Note: Vulnerable ports are marked as such even if there is no update available. => If you wish to ignore this vulnerability rebuild with 'make DISABLE_VULNERABILITIES=yes' *** Error code 1 Stop. make[1]: stopped in /usr/ports/graphics/tiff *** Error code 1 Stop. make: stopped in /usr/ports/graphics/tiff --- What's up with that, it's been there for a few days.. --BC
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1469651692.10602.13.camel>