Date: Fri, 17 Aug 2001 05:16:31 -0400 (EDT) From: "Andrew R. Reiter" <arr@watson.org> To: freebsd-security@freebsd.org Subject: fetchmail fix -- Deleted other thread :-( Message-ID: <Pine.NEB.3.96L.1010817051406.5846A-100000@fledge.watson.org>
next in thread | raw e-mail | index | archive | help
To answer the question, kkenn updated the fetchmail package to get the
non-vulnerable version. If you check the cvs log:
revision 1.127
date: 2001/08/09 21:35:36; author: kris; state: Exp; lines: +2 -2
Upgrade to 5.8.17 ("Another victory for Open Source!"). This fixes a
remotely exploitable buffer overflow when connecting to a malicious
server.
So, update your ports.
Andrew
*-------------.................................................
| Andrew R. Reiter
| arr@fledge.watson.org
| "It requires a very unusual mind
| to undertake the analysis of the obvious" -- A.N. Whitehead
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1010817051406.5846A-100000>
