Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 9 Apr 2002 10:12:03 -0500
From:      "Jacques A. Vidrine" <nectar@FreeBSD.ORG>
To:        Barney Wolff <barney@databus.com>
Cc:        security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Notice FreeBSD-SN-02:01
Message-ID:  <20020409151202.GE19961@madman.nectar.cc>
In-Reply-To: <20020406143243.A8409@tp.databus.com>
References:  <200204051512.g35FCOr11637@freefall.freebsd.org> <20020406143243.A8409@tp.databus.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Apr 06, 2002 at 02:32:43PM -0500, Barney Wolff wrote:
> I don't understand the status of "Not yet fixed."  The advisory says
> mod_ssl versions < 2.8.7 have the bug, while 2.8.8 is the port
> distfile as of 3/28/02.  What am I missing?
> 
> On Fri, Apr 05, 2002 at 07:12:24AM -0800, FreeBSD Security Advisories wrote:
> > +------------------------------------------------------------------------+
> > Port name:      apache13-ssl, apache13-modssl
> > Affected:       all versions of apache+ssl
> >                 all versions of apache+mod_ssl
> > Status:         Not yet fixed.
> > Buffer overflows in SSL session cache handling.
> > <URL:http://www.apache-ssl.org/advisory-20020301.txt>;
> > <URL:http://archives.neohapsis.com/archives/bugtraq/2002-02/0313.html>;

You aren't missing anything.  The port was updated while the notice
was undergoing review, and the new version was missed.  Revisions to
the security notice will follow as ports are fixed.

Cheers, 
-- 
Jacques A. Vidrine <n@nectar.cc>                 http://www.nectar.cc/
NTT/Verio SME          .     FreeBSD UNIX     .       Heimdal Kerberos
jvidrine@verio.net     .  nectar@FreeBSD.org  .          nectar@kth.se

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020409151202.GE19961>