Date: Wed, 2 Mar 2005 16:42:35 +1030 From: Ian Moore <no-spam@swiftdsl.com.au> To: Alexander Leidinger <Alexander@leidinger.net> Cc: freebsd-emulation@freebsd.org Subject: Re: linux-tiff port update Message-ID: <200503021642.42673.no-spam@swiftdsl.com.au> In-Reply-To: <20050226124625.5a336b16@Magellan.Leidinger.net> References: <200502191157.06108.no-spam@swiftdsl.com.au> <20050226124625.5a336b16@Magellan.Leidinger.net>
index | next in thread | previous in thread | raw e-mail
[-- Attachment #1 --] On Sat, 26 Feb 2005 22:16, Alexander Leidinger wrote: > On Sat, 19 Feb 2005 11:56:59 +1030 > > Ian Moore <no-spam@swiftdsl.com.au> wrote: > > Hi, > > The linux-tiff port seems to have a security vunerablility for quite some > > time now. Is a new version due sometime soon, or has it perhaps been made > > Can you point me please to the vulnerabilities (and perhaps newer RPMs)? > > I've just looked for a new update at the suse ftp site, but can' find a > newer version. > > Bye, > Alexander. Yay - it is indeed fixed! Thanks very much for clearing that up for me - I kept thinking for ages that the maintainer would be aware of the vunerablilities & fix it as soon as they could. Maybe in future I shouldn't wait so long... Hey - there's a vunerability in port x and it's been there for 2 hours - what the hell's going on!!! ...Well, maybe not :-) Cheers, -- Ian GPG Key: http://home.swiftdsl.com.au/~imoore/no-spam.asc [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQBCJVlaPUlnmbKkJ6ARAr4+AJ9R5BMNgX9jImwpaaP2QrHG0jhgaACgjECC xHkXjJOsw88lczGx3H9FR5Q= =kIUy -----END PGP SIGNATURE-----help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200503021642.42673.no-spam>
