Date: Tue, 1 Mar 2005 17:07:05 +1030 From: Ian Moore <no-spam@swiftdsl.com.au> To: Jacques Vidrine <nectar@freebsd.org> Cc: security@freebsd.org Subject: Re: linux-tiff port update Message-ID: <200503011707.13998.no-spam@swiftdsl.com.au> In-Reply-To: <42231E8F.3020003@FreeBSD.org> References: <200502191157.06108.no-spam@swiftdsl.com.au> <200502281656.03547.no-spam@swiftdsl.com.au> <42231E8F.3020003@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart4682988.yL98id3bHW Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Tue, 1 Mar 2005 00:07, Jacques Vidrine wrote: > On 2/28/05 12:25 AM, Ian Moore wrote: > > So does that mean I should be able to upgrade from linux-tiff-3.5.5_2 to > > linux-tiff-3.6.1_1 without the security vunerabilty warning now? > > Yes. > > > (Because I > > still the warnings) That was my typo there :-) > > Argh (>_<) my typo. Will fix. > Well I've just updated portaudit's database and one of the warnings has gon= e,=20 but not the other: % portaudit Affected package: curl-7.12.3_2 Type of problem: curl -- authentication buffer overflow vulnerability. Reference:=20 <http://www.FreeBSD.org/ports/portaudit/96df5fd0-8900-11d9-aa18-0001020eed8= 2.html> Affected package: linux-tiff-3.6.1_1 Type of problem: tiff -- tiffdump integer overflow vulnerability. Reference:=20 <http://www.FreeBSD.org/ports/portaudit/8f86d8b5-6025-11d9-a9e7-0001020eed8= 2.html> 2 problem(s) in your installed packages found. Cheers, =2D-=20 Ian GPG Key: http://home.swiftdsl.com.au/~imoore/no-spam.asc --nextPart4682988.yL98id3bHW Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQBCJA2ZPUlnmbKkJ6ARAiiyAJ9A6D6Vw0/DvySyrQCstGDqwUO3bwCgr01t fkCAuuYFNuoFjxAbHlh/G8o= =3zpF -----END PGP SIGNATURE----- --nextPart4682988.yL98id3bHW--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200503011707.13998.no-spam>