Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 5 Aug 2016 16:08:30 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r419692 - head/security/vuxml
Message-ID:  <201608051608.u75G8UvN034428@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Fri Aug  5 16:08:30 2016
New Revision: 419692
URL: https://svnweb.freebsd.org/changeset/ports/419692

Log:
  Cancel tiff vuxml entry for CVE-2016-5102
  
  Upstream has marked it WONTFIX and is removing the utility in 4.0.7.
  There is no indication that this bug does anything other than crash the
  utility.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Aug  5 15:59:42 2016	(r419691)
+++ head/security/vuxml/vuln.xml	Fri Aug  5 16:08:30 2016	(r419692)
@@ -1089,29 +1089,7 @@ Notes:
   </vuln>
 
   <vuln vid="c17fe91d-4aa6-11e6-a7bd-14dae9d210b8">
-    <topic>tiff -- buffer overflow</topic>
-    <affects>
-      <package>
-	<name>tiff</name>
-	<range><lt>4.0.7</lt></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Henri Salo reports:</p>
-	<blockquote cite="http://bugzilla.maptools.org/show_bug.cgi?id=2552">;
-	  <p>buffer overflow in gif2tiff tool</p>
-	</blockquote>
-      </body>
-    </description>
-    <references>
-      <url>http://bugzilla.maptools.org/show_bug.cgi?id=2552</url>;
-      <cvename>CVE-2016-5102</cvename>
-    </references>
-    <dates>
-      <discovery>2016-05-30</discovery>
-      <entry>2016-07-15</entry>
-    </dates>
+    <cancelled/>
   </vuln>
 
   <vuln vid="0ab66088-4aa5-11e6-a7bd-14dae9d210b8">



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201608051608.u75G8UvN034428>