Date: Thu, 11 Sep 2003 13:03:09 +0100 From: Matthew Seaman <m.seaman@infracaninophile.co.uk> To: Zach Roberts <admin@lifelesspeople.com> Cc: sysadmin@alexdupre.com Subject: Re: FreeBSD Port: mysql-server-4.0.14 Message-ID: <20030911120309.GB23712@happy-idiot-talk.infracaninophile.co.uk> In-Reply-To: <000601c3783a$6062cd70$0401a8c0@lifelesspeople.com> References: <000601c3783a$6062cd70$0401a8c0@lifelesspeople.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--aVD9QWMuhilNxW9f Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Sep 11, 2003 at 02:57:39AM -0500, Zach Roberts wrote: > mysql-server-4.0.15 has been released. And it appears there's a potentially exploitable buffer overflow in MySQL 4.0.14 and earlier, or in MySQL 3.0.57 and earlier: http://www.securityfocus.com/archive/1/337012 =20 Cheers, Matthew --=20 Dr Matthew J Seaman MA, D.Phil. 26 The Paddocks Savill Way PGP: http://www.infracaninophile.co.uk/pgpkey Marlow Tel: +44 1628 476614 Bucks., SL7 1TH UK --aVD9QWMuhilNxW9f Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (FreeBSD) iD8DBQE/YGR9dtESqEQa7a0RAuP5AJ9IymvmQiMElcVfUhwlIl12j3HhMgCgk/Ou JG94Pjnl1KNpX/YD0eUaCss= =RrXZ -----END PGP SIGNATURE----- --aVD9QWMuhilNxW9f--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030911120309.GB23712>