From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 119653 invoked by alias); 21 Oct 2015 09:14:02 -0000 Mailing-List: contact cygwin-announce-help@cygwin.com; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-announce-owner@cygwin.com Reply-To: The Cygwin Mailing List Mail-Followup-To: cygwin-announce@cygwin.com Received: (qmail 16109 invoked by uid 89); 21 Oct 2015 07:40:26 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=2.6 required=5.0 tests=AWL,BAYES_50,FREEMAIL_FROM,KAM_COUK,SPF_PASS autolearn=no version=3.3.2 X-HELO: out.ipsmtp1nec.opaltelecom.net X-SMTPAUTH: drstacey@tiscali.co.uk X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A2GHAgAzQCdW/zdY0lUNUAaEBLpwhgkhh34QAQEBAQEBAQODbjABAQEBAQEBAQEBAQEBAQEBAQEBAQEBEwIPQR0BPEA9FhgDAgECAVgIAQGIOa8Dh0mMRi2NMgGDbYQXBZJag0qFGYleSIxAhHaHegNOOIJJgWaGWAEBAQ X-IPAS-Result: A2GHAgAzQCdW/zdY0lUNUAaEBLpwhgkhh34QAQEBAQEBAQODbjABAQEBAQEBAQEBAQEBAQEBAQEBAQEBEwIPQR0BPEA9FhgDAgECAVgIAQGIOa8Dh0mMRi2NMgGDbYQXBZJag0qFGYleSIxAhHaHegNOOIJJgWaGWAEBAQ From: David Stacey Subject: [SECURITY] Updated: libebml-1.3.3-1 Reply-To: The Cygwin Mailing List To: cygwin-announce@cygwin.com Message-ID: <5627415F.5060807@tiscali.co.uk> Date: Wed, 21 Oct 2015 09:14:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-SW-Source: 2015-10/txt/msg00067.txt.bz2 The following packages have been updated in the Cygwin distribution: * libebml4-1.3.3-1 * libebml-devel-1.3.3-1 libebml is a library for reading and writing files with the Extensible Binary Meta Language, a binary pendant to XML. This is an update to the latest upstream release. This release addresses two security vulnerabilities, classified as TALOS-CAN-0036 and TALOS-CAN-0037. Once disclosed publicly, details will be available here: http://talosintel.com/vulnerability-reports/ Dave.