SECURITY: tiff
Yaakov S (Cygwin Ports)
yselkowitz@users.sourceforge.net
Wed Jun 14 21:14:00 GMT 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Yaakov S (Cygwin Ports) wrote:
> Multiple vulnerabilities, ranging from integer overflows and NULL
> pointer dereferences to double frees, were reported in libTIFF.
>
> Solution: Update to >=3.8.1.
>
> More information:
> http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
> http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
> http://bugzilla.remotesensing.org/show_bug.cgi?id=1102
Ping?
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEkHwnpiWmPGlmQSMRAnQHAJ4l/jHxC3VuXBpHyi4vav8/SOiVTwCeI1Ud
FeHLR48sZqnlkOtSXDGWV0E=
=glLU
-----END PGP SIGNATURE-----
More information about the Cygwin-apps
mailing list