aboutsummaryrefslogtreecommitdiffstats
path: root/security/ruby-tcpwrap
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2005-01-14 03:39:14 +0800
committernectar <nectar@FreeBSD.org>2005-01-14 03:39:14 +0800
commit184bd2420e186f688750d78192d98207a34a5ea4 (patch)
treec62623401aa2b49fa162e87a52820d0896e09566 /security/ruby-tcpwrap
parent82a4bff3b9919f51b6bb252b326637bed9fa31a0 (diff)
downloadfreebsd-ports-gnome-184bd2420e186f688750d78192d98207a34a5ea4.tar.gz
freebsd-ports-gnome-184bd2420e186f688750d78192d98207a34a5ea4.tar.zst
freebsd-ports-gnome-184bd2420e186f688750d78192d98207a34a5ea4.zip
Cancel VID 14e8f315-600e-11d9-a9e7-0001020eed82 "tiff -- stripoffsets
integer overflow vulnerability", as it was a subset of VID 3897a2f8-1d57-11d9-bc4a-000c41e2cdad "tiff -- multiple integer overflows". This is another case of iDEFENSE ``discovering'' a vulnerability months after it had already been made public and corrected. I've preserved the iDEFENSE advisory reference by moving it to the older entry, so that someone won't get misled by it again later.
Diffstat (limited to 'security/ruby-tcpwrap')
0 files changed, 0 insertions, 0 deletions