Date: Thu, 13 Jan 2005 19:39:14 +0000 (UTC) From: Jacques Vidrine <nectar@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/vuxml vuln.xml Message-ID: <200501131939.j0DJdEXc000188@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
nectar 2005-01-13 19:39:14 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: Cancel VID 14e8f315-600e-11d9-a9e7-0001020eed82 "tiff -- stripoffsets integer overflow vulnerability", as it was a subset of VID 3897a2f8-1d57-11d9-bc4a-000c41e2cdad "tiff -- multiple integer overflows". This is another case of iDEFENSE ``discovering'' a vulnerability months after it had already been made public and corrected. I've preserved the iDEFENSE advisory reference by moving it to the older entry, so that someone won't get misled by it again later. Revision Changes Path 1.464 +4 -32 ports/security/vuxml/vuln.xml
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501131939.j0DJdEXc000188>