From owner-cvs-all@FreeBSD.ORG Thu Jan 13 19:39:15 2005 Return-Path: Delivered-To: cvs-all@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 36AD316A4CE; Thu, 13 Jan 2005 19:39:15 +0000 (GMT) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0DED343D1F; Thu, 13 Jan 2005 19:39:15 +0000 (GMT) (envelope-from nectar@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id j0DJdEI6000189; Thu, 13 Jan 2005 19:39:14 GMT (envelope-from nectar@repoman.freebsd.org) Received: (from nectar@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id j0DJdEXc000188; Thu, 13 Jan 2005 19:39:14 GMT (envelope-from nectar) Message-Id: <200501131939.j0DJdEXc000188@repoman.freebsd.org> From: Jacques Vidrine Date: Thu, 13 Jan 2005 19:39:14 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Subject: cvs commit: ports/security/vuxml vuln.xml X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Jan 2005 19:39:15 -0000 nectar 2005-01-13 19:39:14 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: Cancel VID 14e8f315-600e-11d9-a9e7-0001020eed82 "tiff -- stripoffsets integer overflow vulnerability", as it was a subset of VID 3897a2f8-1d57-11d9-bc4a-000c41e2cdad "tiff -- multiple integer overflows". This is another case of iDEFENSE ``discovering'' a vulnerability months after it had already been made public and corrected. I've preserved the iDEFENSE advisory reference by moving it to the older entry, so that someone won't get misled by it again later. Revision Changes Path 1.464 +4 -32 ports/security/vuxml/vuln.xml