From owner-freebsd-security Thu Apr 25 3:51:10 2002 Delivered-To: freebsd-security@freebsd.org Received: from heresy.dreamflow.nl (heresy.dreamflow.nl [62.58.36.22]) by hub.freebsd.org (Postfix) with SMTP id 4624F37B404 for ; Thu, 25 Apr 2002 03:51:03 -0700 (PDT) Received: (qmail 94711 invoked by uid 1000); 25 Apr 2002 10:51:01 -0000 Date: Thu, 25 Apr 2002 12:51:01 +0200 From: Bart Matthaei To: freebsd-security@freebsd.org Subject: GNU Screen Braille Module Buffer Overflow Vulnerability Message-ID: <20020425125101.A94677@heresy.dreamflow.nl> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5.1i Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org http://online.securityfocus.com/cgi-bin/sfonline/vulns-item.pl?section=info&id=4578 This seems to applie to the screen in FreeBSD ports. Any word on cvs updates ? B. -- Bart Matthaei bart@dreamflow.nl Avoid reality at all costs. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message