Date: Sun, 04 Jun 2017 18:38:53 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 219783] graphics/tiffgt Message-ID: <bug-219783-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219783 Bug ID: 219783 Summary: graphics/tiffgt Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Keywords: security Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: bofh@freebsd.org Reporter: a@carniajeu.com Assignee: bofh@freebsd.org Flags: maintainer-feedback?(bofh@freebsd.org) The port directs to a vulnerable verion of libtiff (4.0.7_1). Besides, is t= here any reason for it to exist at all, when there's graphics/tiff which installs libtiff too? --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219783-13>