-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yaakov S (Cygwin Ports) wrote: > Multiple vulnerabilities, ranging from integer overflows and NULL > pointer dereferences to double frees, were reported in libTIFF. > > Solution: Update to >=3.8.1. > > More information: > http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml > http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405 > http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024 > http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025 > http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026 > http://bugzilla.remotesensing.org/show_bug.cgi?id=1102
Ping? Yaakov -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.1 (Cygwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFEkHwnpiWmPGlmQSMRAnQHAJ4l/jHxC3VuXBpHyi4vav8/SOiVTwCeI1Ud FeHLR48sZqnlkOtSXDGWV0E= =glLU -----END PGP SIGNATURE-----