From owner-freebsd-security Fri Sep 17 13:12:49 1999 Delivered-To: freebsd-security@freebsd.org Received: from unix1.it-datacntr.louisville.edu (unix1.it-datacntr.louisville.edu [136.165.4.27]) by hub.freebsd.org (Postfix) with ESMTP id 5A7B215836 for ; Fri, 17 Sep 1999 13:12:42 -0700 (PDT) (envelope-from k.stevenson@louisville.edu) Received: from homer.louisville.edu (ktstev01@homer.louisville.edu [136.165.1.20]) by unix1.it-datacntr.louisville.edu (8.8.8/8.8.7) with ESMTP id QAA35934 for ; Fri, 17 Sep 1999 16:12:24 -0400 Received: (from ktstev01@localhost) by homer.louisville.edu (8.8.8/8.8.8) id QAA06250 for freebsd-security@freebsd.org; Fri, 17 Sep 1999 16:12:24 -0400 (EDT) Message-ID: <19990917161224.A5524@homer.louisville.edu> Date: Fri, 17 Sep 1999 16:12:24 -0400 From: Keith Stevenson To: freebsd-security@freebsd.org Subject: Re: CERT amd advisory References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.93.2i In-Reply-To: ; from Doug on Fri, Sep 17, 1999 at 01:42:06PM -0700 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Fri, Sep 17, 1999 at 01:42:06PM -0700, Doug wrote: > INRE CERT Advisory CA-99.12 - Buffer Overflow in amd, I'm > wondering if it's being contemplated to MFC the recent update to amd (to > the non-vulnerable version) prior to 3.3-Release CD's being cut? I know > it's a big change, but I think it might be worth it. Also, FYI the URL for > the FreeBSD advisory on this topic doesn't seem to be on the FTP site yet. I seem to recall the 3.3 Release Notes stating that this problem was fixed. -- Keith Stevenson System Programmer - Data Center Services - University of Louisville k.stevenson@louisville.edu PGP key fingerprint = 4B 29 A8 95 A8 82 EA A2 29 CE 68 DE FC EE B6 A0 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message