From owner-freebsd-emulation@FreeBSD.ORG Sat Feb 26 11:45:40 2005 Return-Path: Delivered-To: freebsd-emulation@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8E92116A4CF for ; Sat, 26 Feb 2005 11:45:40 +0000 (GMT) Received: from mailout10.sul.t-online.com (mailout10.sul.t-online.com [194.25.134.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id BFC8A43D6A for ; Sat, 26 Feb 2005 11:45:39 +0000 (GMT) (envelope-from Alexander@Leidinger.net) Received: from fwd04.aul.t-online.de by mailout10.sul.t-online.com with smtp id 1D50O7-0007Si-02; Sat, 26 Feb 2005 12:45:35 +0100 Received: from Andro-Beta.Leidinger.net (VOziDZZY8e+MwaLS342XZ8B9JE8VwWDg-bNaM1N4R4Rj44xpxg9fZU@[217.83.30.216]) by fmrl04.sul.t-online.com with esmtp id 1D50O1-1o7HKS0; Sat, 26 Feb 2005 12:45:29 +0100 Received: from Magellan.Leidinger.net (Magellan.Leidinger.net [192.168.1.1]) j1QBih9V016171; Sat, 26 Feb 2005 12:44:43 +0100 (CET) (envelope-from Alexander@Leidinger.net) Date: Sat, 26 Feb 2005 12:46:25 +0100 From: Alexander Leidinger To: Ian Moore Message-ID: <20050226124625.5a336b16@Magellan.Leidinger.net> In-Reply-To: <200502191157.06108.no-spam@swiftdsl.com.au> References: <200502191157.06108.no-spam@swiftdsl.com.au> X-Mailer: Sylpheed-Claws 1.0.1 (GTK+ 1.2.10; i386-portbld-freebsd6.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-ID: VOziDZZY8e+MwaLS342XZ8B9JE8VwWDg-bNaM1N4R4Rj44xpxg9fZU@t-dialin.net X-TOI-MSGID: cf42ea18-8137-4158-a7dd-fac06090a849 cc: freebsd-emulation@freebsd.org Subject: Re: linux-tiff port update X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 26 Feb 2005 11:45:40 -0000 On Sat, 19 Feb 2005 11:56:59 +1030 Ian Moore wrote: > Hi, > The linux-tiff port seems to have a security vunerablility for quite some time > now. Is a new version due sometime soon, or has it perhaps been made Can you point me please to the vulnerabilities (and perhaps newer RPMs)? I've just looked for a new update at the suse ftp site, but can' find a newer version. Bye, Alexander. -- To boldly go where I surely don't belong. http://www.Leidinger.net Alexander @ Leidinger.net GPG fingerprint = C518 BC70 E67F 143F BE91 3365 79E2 9C60 B006 3FE7