From owner-freebsd-security Thu Dec 2 15:36:45 1999 Delivered-To: freebsd-security@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 758) id 5912D14A05; Thu, 2 Dec 1999 15:36:44 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by hub.freebsd.org (Postfix) with ESMTP id 482B31CD627; Thu, 2 Dec 1999 15:36:44 -0800 (PST) (envelope-from kris@hub.freebsd.org) Date: Thu, 2 Dec 1999 15:36:44 -0800 (PST) From: Kris Kennaway To: Todd Backman Cc: security@freebsd.org Subject: Re: Security Advisory: Buffer overflow in RSAREF2 (fwd) In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 2 Dec 1999, Kris Kennaway wrote: > It's been patched: re-cvsup your ports and rebuild rsaref, followed by > anything which depends on it (i.e. which statically links to librsaref.a > - but easier and safer to just do all of the dependencies). I forgot to mention the easy way to get this list: cat /var/db/pkg/rsaref-2.0/+REQUIRED_BY before you rebuild. Kris To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message