SECURITY: tiff

Yaakov S (Cygwin Ports) yselkowitz@users.sourceforge.net
Tue May 30 22:26:00 GMT 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple vulnerabilities, ranging from integer overflows and NULL
pointer dereferences to double frees, were reported in libTIFF.

Solution:  Update to >=3.8.1.

More information:
http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
http://bugzilla.remotesensing.org/show_bug.cgi?id=1102


Yaakov

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEfMahpiWmPGlmQSMRAuJJAKDsj4ul7c7EmzhHh01JenjVJqQh1wCfTq4a
PWAehpW9Rd+/H2fILsjmMoI=
=YvdS
-----END PGP SIGNATURE-----



More information about the Cygwin-apps mailing list