linux-tiff port update

Ian Moore no-spam at swiftdsl.com.au
Tue Mar 1 06:37:18 GMT 2005


On Tue, 1 Mar 2005 00:07, Jacques Vidrine wrote:
> On 2/28/05 12:25 AM, Ian Moore wrote:
> > So does that mean I should be able to upgrade from linux-tiff-3.5.5_2 to
> > linux-tiff-3.6.1_1 without the security vunerabilty warning now?
>
> Yes.
>
> > (Because I
> > still the warnings)
That was my typo there :-)
>
> Argh (>_<)  my typo.  Will fix.
>

Well I've just updated portaudit's database and one of the warnings has gone, 
but not the other:

% portaudit
Affected package: curl-7.12.3_2
Type of problem: curl -- authentication buffer overflow vulnerability.
Reference: 
<http://www.FreeBSD.org/ports/portaudit/96df5fd0-8900-11d9-aa18-0001020eed82.html>

Affected package: linux-tiff-3.6.1_1
Type of problem: tiff -- tiffdump integer overflow vulnerability.
Reference: 
<http://www.FreeBSD.org/ports/portaudit/8f86d8b5-6025-11d9-a9e7-0001020eed82.html>

2 problem(s) in your installed packages found.

Cheers,
-- 
Ian

GPG Key: http://home.swiftdsl.com.au/~imoore/no-spam.asc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-emulation/attachments/20050301/30a07f5c/attachment.bin


More information about the freebsd-emulation mailing list