diff options
author | nectar <nectar@FreeBSD.org> | 2005-01-14 03:39:14 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2005-01-14 03:39:14 +0800 |
commit | 184bd2420e186f688750d78192d98207a34a5ea4 (patch) | |
tree | c62623401aa2b49fa162e87a52820d0896e09566 /security/ruby-tcpwrap | |
parent | 82a4bff3b9919f51b6bb252b326637bed9fa31a0 (diff) | |
download | freebsd-ports-gnome-184bd2420e186f688750d78192d98207a34a5ea4.tar.gz freebsd-ports-gnome-184bd2420e186f688750d78192d98207a34a5ea4.tar.zst freebsd-ports-gnome-184bd2420e186f688750d78192d98207a34a5ea4.zip |
Cancel VID 14e8f315-600e-11d9-a9e7-0001020eed82 "tiff -- stripoffsets
integer overflow vulnerability", as it was a subset of VID
3897a2f8-1d57-11d9-bc4a-000c41e2cdad "tiff -- multiple integer
overflows". This is another case of iDEFENSE ``discovering'' a
vulnerability months after it had already been made public and
corrected. I've preserved the iDEFENSE advisory reference by moving it
to the older entry, so that someone won't get misled by it again later.
Diffstat (limited to 'security/ruby-tcpwrap')
0 files changed, 0 insertions, 0 deletions