Date: Fri, 5 Aug 2016 20:55:07 +0800 From: alphachi <alphachi@mediaspirit.org> To: Aleksandr Miroslav <alexmiroslav@gmail.com> Cc: "list: freebsd" <freebsd-questions@freebsd.org> Subject: Re: tiff vulnerability in ports? Message-ID: <CAJN5%2BGtsJ=n2m8Xz5eZj92yo5vFZST0dO1ZnLCpmf4x0H95w-Q@mail.gmail.com> In-Reply-To: <CACcSE1z4m_o9z2Ttw-Sb7bNhVmnwDrVX8BQFfa2a_dBbW_hwyw@mail.gmail.com> References: <CACcSE1z4m_o9z2Ttw-Sb7bNhVmnwDrVX8BQFfa2a_dBbW_hwyw@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Please see this link to get more information: https://svnweb.freebsd.org/ports?view=revision&revision=418585 2016-08-05 0:23 GMT+08:00 Aleksandr Miroslav <alexmiroslav@gmail.com>: > This is perhaps a question for the tiff devs more than anything, but I > noticed that pkg audit has been complaining about libtiff (graphics/tiff) > for some time now. > > FreeBSD's VUXML database says anything before 4.0.7 is affected, but > apparently that version hasn't been released yet (according to > http://www.remotesensing.org/libtiff/, the latest stable release is still > 4.0.6). > > Anyone know what's going on? Is there a release upcoming to fix this? > > Thanks, > Alex > _______________________________________________ > freebsd-questions@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions- > unsubscribe@freebsd.org" > -- Paranoid in Sabbath ...
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAJN5%2BGtsJ=n2m8Xz5eZj92yo5vFZST0dO1ZnLCpmf4x0H95w-Q>