Date: Sat, 30 Jul 2005 23:26:53 +0200 From: "Simon L. Nielsen" <simon@FreeBSD.org> To: freebsd-emulation@FreeBSD.org Subject: Security vulnerability in linux-tiff Message-ID: <20050730212653.GP930@zaphod.nitro.dk>
next in thread | raw e-mail | index | archive | help
--dp9QYJgVRVEW2bsm Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello linux-tiff maintainer, As recently documented in the FreeBSD VuXML document [1] there is a security vulnerability in linux-tiff. This has been fixed in the upstream version, 3.7.3. Please update the port as soon as possible. Thanks in advance. [1] http://vuxml.FreeBSD.org/68222076-010b-11da-bc08-0001020eed82.html --=20 Simon L. Nielsen FreeBSD Security Team --dp9QYJgVRVEW2bsm Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (FreeBSD) iD8DBQFC6/Cdh9pcDSc1mlERAlRhAKDJ40zVyZU8I2xtpQWQJioZT+8OTACfZyh7 ClxK1z1L+cdcL9JLIiBt28o= =U8G0 -----END PGP SIGNATURE----- --dp9QYJgVRVEW2bsm--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050730212653.GP930>