Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Jul 2016 22:34:52 +0200
From:      Bjorn Carlsson <bc@skogen.nu>
To:        freebsd-ports-bugs@freebsd.org
Subject:   Oh no!
Message-ID:  <1469651692.10602.13.camel@newlap.skogen.nu>

next in thread | raw e-mail | index | archive | help
===>>> All >> libgd-2.1.1,1 >> tiff-4.0.6_1 (12/15)

===>  Cleaning for tiff-4.0.6_2
===>  tiff-4.0.6_2 has known vulnerabilities:
tiff-4.0.6_2 is vulnerable:
tiff -- buffer overflow
CVE: CVE-2016-5102
WWW: https://vuxml.FreeBSD.org/freebsd/c17fe91d-4aa6-11e6-a7bd-14dae9d210b8.html

1 problem(s) in the installed packages found.
=> Please update your ports tree and try again.
=> Note: Vulnerable ports are marked as such even if there is no update available.
=> If you wish to ignore this vulnerability rebuild with 'make DISABLE_VULNERABILITIES=yes'
*** Error code 1

Stop.
make[1]: stopped in /usr/ports/graphics/tiff
*** Error code 1

Stop.
make: stopped in /usr/ports/graphics/tiff

---

What's up with that, it's been there for a few days..

--BC





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1469651692.10602.13.camel>