Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 2 Mar 2005 16:42:35 +1030
From:      Ian Moore <no-spam@swiftdsl.com.au>
To:        Alexander Leidinger <Alexander@leidinger.net>
Cc:        freebsd-emulation@freebsd.org
Subject:   Re: linux-tiff port update
Message-ID:  <200503021642.42673.no-spam@swiftdsl.com.au>
In-Reply-To: <20050226124625.5a336b16@Magellan.Leidinger.net>
References:  <200502191157.06108.no-spam@swiftdsl.com.au> <20050226124625.5a336b16@Magellan.Leidinger.net>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
On Sat, 26 Feb 2005 22:16, Alexander Leidinger wrote:
> On Sat, 19 Feb 2005 11:56:59 +1030
>
> Ian Moore <no-spam@swiftdsl.com.au> wrote:
> > Hi,
> > The linux-tiff port seems to have a security vunerablility for quite some
> > time now. Is a new version due sometime soon, or has it perhaps been made
>
> Can you point me please to the vulnerabilities (and perhaps newer RPMs)?
>
> I've just looked for a new update at the suse ftp site, but can' find a
> newer version.
>
> Bye,
> Alexander.

Yay - it is indeed fixed!
Thanks very much for clearing that up for me - I kept thinking for ages that 
the maintainer would be aware of the vunerablilities & fix it as soon as they 
could.
Maybe in future I shouldn't wait so long...
Hey - there's a vunerability in port x and it's been there for 2 hours - what 
the hell's going on!!! 
...Well, maybe not  :-)

Cheers,
-- 
Ian

GPG Key: http://home.swiftdsl.com.au/~imoore/no-spam.asc

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (FreeBSD)

iD8DBQBCJVlaPUlnmbKkJ6ARAr4+AJ9R5BMNgX9jImwpaaP2QrHG0jhgaACgjECC
xHkXjJOsw88lczGx3H9FR5Q=
=kIUy
-----END PGP SIGNATURE-----
help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200503021642.42673.no-spam>