Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 30 Jul 2005 23:26:53 +0200
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        freebsd-emulation@FreeBSD.org
Subject:   Security vulnerability in linux-tiff
Message-ID:  <20050730212653.GP930@zaphod.nitro.dk>

next in thread | raw e-mail | index | archive | help

--dp9QYJgVRVEW2bsm
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hello linux-tiff maintainer,

As recently documented in the FreeBSD VuXML document [1] there is a
security vulnerability in linux-tiff.  This has been fixed in the
upstream version, 3.7.3.

Please update the port as soon as possible.

Thanks in advance.

[1] http://vuxml.FreeBSD.org/68222076-010b-11da-bc08-0001020eed82.html

--=20
Simon L. Nielsen
FreeBSD Security Team

--dp9QYJgVRVEW2bsm
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFC6/Cdh9pcDSc1mlERAlRhAKDJ40zVyZU8I2xtpQWQJioZT+8OTACfZyh7
ClxK1z1L+cdcL9JLIiBt28o=
=U8G0
-----END PGP SIGNATURE-----

--dp9QYJgVRVEW2bsm--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050730212653.GP930>