Date: Thu, 13 Jan 2005 19:39:14 +0000 (UTC) From: Jacques Vidrine <nectar@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/vuxml vuln.xml Message-ID: <200501131939.j0DJdEXc000188@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
nectar 2005-01-13 19:39:14 UTC
FreeBSD ports repository
Modified files:
security/vuxml vuln.xml
Log:
Cancel VID 14e8f315-600e-11d9-a9e7-0001020eed82 "tiff -- stripoffsets
integer overflow vulnerability", as it was a subset of VID
3897a2f8-1d57-11d9-bc4a-000c41e2cdad "tiff -- multiple integer
overflows". This is another case of iDEFENSE ``discovering'' a
vulnerability months after it had already been made public and
corrected. I've preserved the iDEFENSE advisory reference by moving it
to the older entry, so that someone won't get misled by it again later.
Revision Changes Path
1.464 +4 -32 ports/security/vuxml/vuln.xml
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501131939.j0DJdEXc000188>
