SECURITY: file
Corinna Vinschen
corinna-cygwin@cygwin.com
Mon Apr 2 07:52:00 GMT 2007
On Mar 31 22:46, Yaakov (Cygwin Ports) wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> A buffer underflow vulnerability has been reported in file allowing for
> the user-assisted execution of arbitrary code.
>
> Solution: bump to >=4.20 (current is 4.19).
>
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536
> http://security.gentoo.org/glsa/glsa-200703-26.xml
Thanks, I uploaded the new release.
Corinna
--
Corinna Vinschen Please, send mails regarding Cygwin to
Cygwin Project Co-Leader cygwin AT cygwin DOT com
Red Hat
More information about the Cygwin-apps
mailing list