From owner-freebsd-ports Mon Jan 20 4:37: 0 2003 Delivered-To: freebsd-ports@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 48AF937B401 for ; Mon, 20 Jan 2003 04:36:59 -0800 (PST) Received: from nmail.altkom.com.pl (mail.altkom.com.pl [195.94.220.102]) by mx1.FreeBSD.org (Postfix) with ESMTP id BAE0043F1E for ; Mon, 20 Jan 2003 04:36:53 -0800 (PST) (envelope-from olo@altkom.com.pl) Received: from altkom.com.pl ([195.94.220.61]) by nmail.altkom.com.pl (Netscape Messaging Server 4.15) with ESMTP id H90J1A00.108 for ; Mon, 20 Jan 2003 13:36:46 +0100 Message-ID: <3E2BED5E.6050808@altkom.com.pl> Date: Mon, 20 Jan 2003 13:36:46 +0100 From: Aleksander Adamowski User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030119 X-Accept-Language: pl, en-us MIME-Version: 1.0 To: ports@FreeBSD.org Subject: openldap-2.0.25_3 needs a security fix Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Hi! The Suse team has found multiple vulnerabilities in OpenLDAP 2 during their security review. It would be nice to update the port before script kiddie exploits start popping up ;) The advisories are here: http://www.suse.de/de/security/2002_047_openldap2.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1378 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1379 Best Regards, -- Olo GG#: 274614 ICQ UIN: 19780575 http://olo.office.altkom.com.pl To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message