From owner-freebsd-security Sat Dec 11 2:35: 5 1999 Delivered-To: freebsd-security@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 758) id 714F214E54; Sat, 11 Dec 1999 02:35:04 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by hub.freebsd.org (Postfix) with ESMTP id 5C3C51CD79B; Sat, 11 Dec 1999 02:35:04 -0800 (PST) (envelope-from kris@hub.freebsd.org) Date: Sat, 11 Dec 1999 02:35:04 -0800 (PST) From: Kris Kennaway To: Mike Tancsa Cc: security@FreeBSD.ORG Subject: Re: RSAREF updated patch (was Re: Security Advisory: Buffer overflow in RSAREF2 (fwd)) In-Reply-To: <4.1.19991210230845.03a92100@granite.sentex.ca> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Fri, 10 Dec 1999, Mike Tancsa wrote: > There seems to be another update posted to BUGTRAQ around this issue. Here > is part of the post. Yes, I saw it - I'll get this committed as soon as the ports freeze for 3.4 is up. It's a shame this arrived a few hours after the freeze, although since we don't ship any rsaref-containing binaries (or any other crypto binaries) on CD it's not quite so bad. Kris To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message