Date: Fri, 17 Aug 2001 05:16:31 -0400 (EDT) From: "Andrew R. Reiter" <arr@watson.org> To: freebsd-security@freebsd.org Subject: fetchmail fix -- Deleted other thread :-( Message-ID: <Pine.NEB.3.96L.1010817051406.5846A-100000@fledge.watson.org>
next in thread | raw e-mail | index | archive | help
To answer the question, kkenn updated the fetchmail package to get the non-vulnerable version. If you check the cvs log: revision 1.127 date: 2001/08/09 21:35:36; author: kris; state: Exp; lines: +2 -2 Upgrade to 5.8.17 ("Another victory for Open Source!"). This fixes a remotely exploitable buffer overflow when connecting to a malicious server. So, update your ports. Andrew *-------------................................................. | Andrew R. Reiter | arr@fledge.watson.org | "It requires a very unusual mind | to undertake the analysis of the obvious" -- A.N. Whitehead To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1010817051406.5846A-100000>