Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Apr 2000 18:26:26 -0700 (PDT)
From:      Kris Kennaway <kris@FreeBSD.org>
To:        Andy Sparrow <andy@geek4food.org>
Cc:        Paul Chvostek <paul@it.ca>, Ade Lovett <ade@FreeBSD.ORG>, ports@FreeBSD.ORG
Subject:   Re: comms/hylafax 
Message-ID:  <Pine.BSF.4.21.0004291820350.82188-100000@freefall.freebsd.org>
In-Reply-To: <200004300113.SAA59876@mega.geek4food.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 29 Apr 2000, Andy Sparrow wrote:

> Yes, 312 messages so far this month. 
> 
> In particular, Hylafax 4.1 beta2 is being readied for release.
> 
> Bug fixes and patches are being produced, seems to be active.

Perhaps, but they haven't ever made a public announcement acknowledging
the security holes, offering a patch to fix them, or even acknowledging
the email I sent enquiring about it on behalf of FreeBSD.

Check the vulnerability database on www.securityfocus.com, or failing
that, the bugtraq archives, for reference to the problem. It's not a
simple problem to fix, but requires an in-depth audit of the code.

There have been patches posted on the freebsd-audit mailing list which
attempt to address some of the problems, but I haven't had the time to
look at them. Ideally someone needs to work with the hylafax developers
about this (assuming they can get a response this time).

Kris

----
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0004291820350.82188-100000>