Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Aug 2001 05:16:31 -0400 (EDT)
From:      "Andrew R. Reiter" <arr@watson.org>
To:        freebsd-security@freebsd.org
Subject:   fetchmail fix -- Deleted other thread :-(
Message-ID:  <Pine.NEB.3.96L.1010817051406.5846A-100000@fledge.watson.org>

next in thread | raw e-mail | index | archive | help

To answer the question, kkenn updated the fetchmail package to get the
non-vulnerable version.  If you check the cvs log:

revision 1.127
date: 2001/08/09 21:35:36;  author: kris;  state: Exp;  lines: +2 -2
Upgrade to 5.8.17 ("Another victory for Open Source!").  This fixes a
remotely exploitable buffer overflow when connecting to a malicious
server.

So, update your ports.

Andrew

*-------------.................................................
| Andrew R. Reiter 
| arr@fledge.watson.org
| "It requires a very unusual mind
|   to undertake the analysis of the obvious" -- A.N. Whitehead


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1010817051406.5846A-100000>