On 2012-12-15 23:06, Yaakov (Cygwin/X) wrote:
Chuck,
Security vulnerabilities have been announced for the tiff package.
Please update tiff to 3.9.7 together with this patchset ASAP:
http://pkgs.fedoraproject.org/cgit/libtiff.git/tree/?h=f17
On 2012-08-15 02:30, Yaakov (Cygwin/X) wrote:
On Tue, 2012-08-14 at 22:05 +0200, Corinna Vinschen wrote:
Chuck?
Ping 2?
If you don't reply I guess we have to assume you're not with us
anymore. Which would be too bad.
Indeed. :-(
Dito.
On Aug 3 09:58, Corinna Vinschen wrote:
On Jul
Chuck?
Ping 2?
If you don't reply I guess we have to assume you're not with us
anymore. Which would be too bad.
On Aug 3 09:58, Corinna Vinschen wrote:
Chuck?
Ping? Are you still with us?
On Jul 23 16:48, Yaakov (Cygwin/X) wrote:
Chuck,
Security vulnerabilities are accumulating
On Tue, 2012-08-14 at 22:05 +0200, Corinna Vinschen wrote:
Chuck?
Ping 2?
If you don't reply I guess we have to assume you're not with us
anymore. Which would be too bad.
Indeed. :-(
On Aug 3 09:58, Corinna Vinschen wrote:
On Jul 23 16:48, Yaakov (Cygwin/X) wrote:
Chuck,
Chuck?
Ping? Are you still with us?
On Jul 23 16:48, Yaakov (Cygwin/X) wrote:
Chuck,
Security vulnerabilities are accumulating for the tiff package
(CVE-2011-0192, CVE-2011-1167, CVE-2012-1173, CVE-2012-2088,
CVE-2012-2113, CVE-2012-3401). This can be fixed by updating to
3.9.6 and
Chuck,
Security vulnerabilities are accumulating for the tiff package
(CVE-2011-0192, CVE-2011-1167, CVE-2012-1173, CVE-2012-2088,
CVE-2012-2113, CVE-2012-3401). This can be fixed by updating to 3.9.6
and applying the four patches found here:
On 4/3/2011 4:17 PM, Yaakov (Cygwin/X) wrote:
Security vulnerabilities have been announced in the tiff package.
Thanks for the heads up. I'll update later this week.
--
Chuck
Chuck,
Security vulnerabilities have been announced in the tiff package. The
remedy is to update to the latest 3.9.4 release AND apply the following
patches:
http://pkgs.fedoraproject.org/gitweb/?p=libtiff.git;a=blob_plain;f=libtiff-CVE-2011-0192.patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
Yaakov S (Cygwin Ports) wrote:
Multiple vulnerabilities, ranging from integer overflows and NULL
pointer dereferences to double frees, were reported in libTIFF.
And now, there's more:
A buffer overflow has been
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
Multiple vulnerabilities, ranging from integer overflows and NULL
pointer dereferences to double frees, were reported in libTIFF.
And now, there's more:
A buffer overflow has been found in the t2p_write_pdf_string
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
Solution: update to 3.8.2 and apply the following patches:
http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
Multiple vulnerabilities, ranging from integer overflows and NULL
pointer dereferences to double frees, were reported in libTIFF.
Solution: Update to =3.8.1.
More information:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Multiple vulnerabilities, ranging from integer overflows and NULL
pointer dereferences to double frees, were reported in libTIFF.
Solution: Update to =3.8.1.
More information:
http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
13 matches
Mail list logo