SECURITY: tiff

Yaakov S (Cygwin Ports) yselkowitz@users.sourceforge.net
Wed Jun 14 21:14:00 GMT 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yaakov S (Cygwin Ports) wrote:
> Multiple vulnerabilities, ranging from integer overflows and NULL
> pointer dereferences to double frees, were reported in libTIFF.
> 
> Solution:  Update to >=3.8.1.
> 
> More information:
> http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
> http://bugzilla.remotesensing.org/show_bug.cgi?id=1102

Ping?


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEkHwnpiWmPGlmQSMRAnQHAJ4l/jHxC3VuXBpHyi4vav8/SOiVTwCeI1Ud
FeHLR48sZqnlkOtSXDGWV0E=
=glLU
-----END PGP SIGNATURE-----



More information about the Cygwin-apps mailing list