Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Jan 2005 19:39:14 +0000 (UTC)
From:      Jacques Vidrine <nectar@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <200501131939.j0DJdEXc000188@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
nectar      2005-01-13 19:39:14 UTC

  FreeBSD ports repository

  Modified files:
    security/vuxml       vuln.xml 
  Log:
  Cancel VID 14e8f315-600e-11d9-a9e7-0001020eed82 "tiff -- stripoffsets
  integer overflow vulnerability", as it was a subset of VID
  3897a2f8-1d57-11d9-bc4a-000c41e2cdad "tiff -- multiple integer
  overflows".  This is another case of iDEFENSE ``discovering'' a
  vulnerability months after it had already been made public and
  corrected.  I've preserved the iDEFENSE advisory reference by moving it
  to the older entry, so that someone won't get misled by it again later.
  
  Revision  Changes    Path
  1.464     +4 -32     ports/security/vuxml/vuln.xml



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501131939.j0DJdEXc000188>