I am trying to load up the latest snapshot of FreeRadius, but I have
been warned by FreeBSD developers to not run the released version
because of the remotely exploitable buffer overflow security hole.

Is there a patch that covers this?  If so, we can get guys to take the
security hold off of the port.  If not, is there a timeframe to fix?

Scott Pell


[EMAIL PROTECTED] wrote:

<<On Tue, 19 Feb 2002 12:54:26 -0800, "Scott Pell" <[EMAIL PROTECTED]>
said:

> Trying update and install this port...getting the following: ===>  
> freeradius-devel-20010310 is forbidden: Remotely exploitable buffer 
> overflow.

> Any recommendations on how to get this port installed?

Don't.  When I (or anyone else, for that matter) get a
sufficiently-large Round Tuit, the port will be replaced with one for a
released version of FreeRADIUS which doesn't have the security hole.

-GAWollman

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.324 / Virus Database: 181 - Release Date: 2/14/2002
 


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to