Date: Sun, 10 Dec 2000 20:03:40 -0800 From: kris@citusc.usc.edu To: Matt Watson <sideshow@terahertz.net> Cc: Roman Shterenzon <roman@xpert.com>, freebsd-security@FreeBSD.ORG, cj@vallcom.net Subject: Re: Buffer vulnerability in BitchX irc client Message-ID: <20001210200340.D22065@citusc.usc.edu> In-Reply-To: <Pine.BSF.4.21.0012101140360.72996-100000@venus.terahertz.net>; from sideshow@terahertz.net on Sun, Dec 10, 2000 at 11:42:47AM -0600 References: <Pine.LNX.4.30.0012101434070.31366-100000@jamus.xpert.com> <Pine.BSF.4.21.0012101140360.72996-100000@venus.terahertz.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Dec 10, 2000 at 11:42:47AM -0600, Matt Watson wrote: > This bug is already known to the bitchx coders and has already been > patched in the CVS. Shortly i will be posting the patches for 75p3 and > 1.0c17 on www.bitchx.org and ftp.bitchx.org as soon as i get my hands on > them. I'm not the maintainers of the port but I do run the bitchx.org > sites, so, should the port be downloading from ftp.bitchx.org there will > be no need to include a special patch in the port. Please don't modify an already released version without changing the version number - it will change the MD5 checksum for a start, so the port will no longer build, and makes more work for port maintainers when they have to go into the distfile and compare it with the old version to find out what changed. Kris To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001210200340.D22065>