Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 5 Aug 2016 20:55:07 +0800
From:      alphachi <alphachi@mediaspirit.org>
To:        Aleksandr Miroslav <alexmiroslav@gmail.com>
Cc:        "list: freebsd" <freebsd-questions@freebsd.org>
Subject:   Re: tiff vulnerability in ports?
Message-ID:  <CAJN5%2BGtsJ=n2m8Xz5eZj92yo5vFZST0dO1ZnLCpmf4x0H95w-Q@mail.gmail.com>
In-Reply-To: <CACcSE1z4m_o9z2Ttw-Sb7bNhVmnwDrVX8BQFfa2a_dBbW_hwyw@mail.gmail.com>
References:  <CACcSE1z4m_o9z2Ttw-Sb7bNhVmnwDrVX8BQFfa2a_dBbW_hwyw@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Please see this link to get more information:

https://svnweb.freebsd.org/ports?view=revision&revision=418585

2016-08-05 0:23 GMT+08:00 Aleksandr Miroslav <alexmiroslav@gmail.com>:

> This is perhaps a question for the tiff devs more than anything, but I
> noticed that pkg audit has been complaining about libtiff (graphics/tiff)
> for some time now.
>
> FreeBSD's VUXML database says anything before 4.0.7 is affected, but
> apparently that version hasn't been released yet (according to
> http://www.remotesensing.org/libtiff/, the latest stable release is still
> 4.0.6).
>
> Anyone know what's going on? Is there a release upcoming to fix this?
>
> Thanks,
> Alex
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-
> unsubscribe@freebsd.org"
>



-- 
Paranoid in Sabbath ...



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAJN5%2BGtsJ=n2m8Xz5eZj92yo5vFZST0dO1ZnLCpmf4x0H95w-Q>