SECURITY: file

Corinna Vinschen corinna-cygwin@cygwin.com
Mon Apr 2 07:52:00 GMT 2007


On Mar 31 22:46, Yaakov (Cygwin Ports) wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> A buffer underflow vulnerability has been reported in file allowing for
> the user-assisted execution of arbitrary code.
> 
> Solution: bump to >=4.20 (current is 4.19).
> 
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536
> http://security.gentoo.org/glsa/glsa-200703-26.xml

Thanks, I uploaded the new release.


Corinna

-- 
Corinna Vinschen                  Please, send mails regarding Cygwin to
Cygwin Project Co-Leader          cygwin AT cygwin DOT com
Red Hat



More information about the Cygwin-apps mailing list