From owner-freebsd-emulation@FreeBSD.ORG Wed Mar 2 06:12:46 2005 Return-Path: Delivered-To: freebsd-emulation@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id AA62D16A4CE for ; Wed, 2 Mar 2005 06:12:46 +0000 (GMT) Received: from smtp.ade.swiftdsl.com.au (smtp.ade.swiftdsl.com.au [218.214.228.98]) by mx1.FreeBSD.org (Postfix) with SMTP id 6BD8A43D1F for ; Wed, 2 Mar 2005 06:12:45 +0000 (GMT) (envelope-from no-spam@swiftdsl.com.au) Received: (qmail 25125 invoked from network); 2 Mar 2005 06:12:46 -0000 Received: from unknown (HELO daemon.foo.lan) (218.214.176.70) by smtp.ade.swiftdsl.com.au with SMTP; 2 Mar 2005 06:12:46 -0000 From: Ian Moore To: Alexander Leidinger Date: Wed, 2 Mar 2005 16:42:35 +1030 User-Agent: KMail/1.7.2 References: <200502191157.06108.no-spam@swiftdsl.com.au> <20050226124625.5a336b16@Magellan.Leidinger.net> In-Reply-To: <20050226124625.5a336b16@Magellan.Leidinger.net> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart2357021.pWJDTd4W5P"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit Message-Id: <200503021642.42673.no-spam@swiftdsl.com.au> cc: freebsd-emulation@freebsd.org Subject: Re: linux-tiff port update X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Mar 2005 06:12:46 -0000 --nextPart2357021.pWJDTd4W5P Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Sat, 26 Feb 2005 22:16, Alexander Leidinger wrote: > On Sat, 19 Feb 2005 11:56:59 +1030 > > Ian Moore wrote: > > Hi, > > The linux-tiff port seems to have a security vunerablility for quite so= me > > time now. Is a new version due sometime soon, or has it perhaps been ma= de > > Can you point me please to the vulnerabilities (and perhaps newer RPMs)? > > I've just looked for a new update at the suse ftp site, but can' find a > newer version. > > Bye, > Alexander. Yay - it is indeed fixed! Thanks very much for clearing that up for me - I kept thinking for ages tha= t=20 the maintainer would be aware of the vunerablilities & fix it as soon as th= ey=20 could. Maybe in future I shouldn't wait so long... Hey - there's a vunerability in port x and it's been there for 2 hours - wh= at=20 the hell's going on!!!=20 =2E..Well, maybe not :-) Cheers, =2D-=20 Ian GPG Key: http://home.swiftdsl.com.au/~imoore/no-spam.asc --nextPart2357021.pWJDTd4W5P Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQBCJVlaPUlnmbKkJ6ARAr4+AJ9R5BMNgX9jImwpaaP2QrHG0jhgaACgjECC xHkXjJOsw88lczGx3H9FR5Q= =kIUy -----END PGP SIGNATURE----- --nextPart2357021.pWJDTd4W5P--