From owner-freebsd-emulation@FreeBSD.ORG Mon Feb 28 06:26:09 2005 Return-Path: Delivered-To: freebsd-emulation@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0E76C16A4CE for ; Mon, 28 Feb 2005 06:26:09 +0000 (GMT) Received: from smtp.ade.swiftdsl.com.au (smtp.ade.swiftdsl.com.au [218.214.228.98]) by mx1.FreeBSD.org (Postfix) with SMTP id 6D1F943D5A for ; Mon, 28 Feb 2005 06:26:07 +0000 (GMT) (envelope-from no-spam@swiftdsl.com.au) Received: (qmail 20557 invoked from network); 28 Feb 2005 06:26:07 -0000 Received: from unknown (HELO daemon.foo.lan) (218.214.176.70) by smtp.ade.swiftdsl.com.au with SMTP; 28 Feb 2005 06:26:07 -0000 From: Ian Moore To: Jacques Vidrine Date: Mon, 28 Feb 2005 16:55:55 +1030 User-Agent: KMail/1.7.2 References: <200502191157.06108.no-spam@swiftdsl.com.au> <20050226151113.00ec3099@Magellan.Leidinger.net> <4222939A.9070808@FreeBSD.org> In-Reply-To: <4222939A.9070808@FreeBSD.org> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart3373443.pHIpO94GyZ"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit Message-Id: <200502281656.03547.no-spam@swiftdsl.com.au> cc: Alexander Leidinger cc: freebsd-emulation@freebsd.org cc: security@freebsd.org Subject: Re: linux-tiff port update X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Feb 2005 06:26:09 -0000 --nextPart3373443.pHIpO94GyZ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Mon, 28 Feb 2005 14:14, Jacques Vidrine wrote: > On 2/26/05 8:11 AM, Alexander Leidinger wrote: > > Hello security team, is this an error in the vuln.xml document or is the > > commit log of the port-Makefile misleading > > It's our bad. It looks like we mistakenly believed the FreeBSD package > version numbers were aligned between tiff and linux-tiff. > > > (and Suse is still > > vulnerable, since they don't offer newer packages)? > > No, these issues are fixed in those packages. > > Cheers, So does that mean I should be able to upgrade from linux-tiff-3.5.5_2 to=20 linux-tiff-3.6.1_1 without the security vunerabilty warning now? (Because I= =20 still the warnings) Cheers, =2D-=20 Ian GPG Key: http://home.swiftdsl.com.au/~imoore/no-spam.asc --nextPart3373443.pHIpO94GyZ Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQBCIrl7PUlnmbKkJ6ARAjJ5AJ4j3Zv1vdSUppdIn44+hXS9cqSOLgCdFSpt l69xT/qfmoqz9EmeNYN5GQI= =NmSC -----END PGP SIGNATURE----- --nextPart3373443.pHIpO94GyZ--