"Scott Pell" <[EMAIL PROTECTED]>wrote:
> I am trying to load up the latest snapshot of FreeRadius, but I have
> been warned by FreeBSD developers to not run the released version
> because of the remotely exploitable buffer overflow security hole.

  Yeah, the latest CVS snapshot should be OK.  The fix was done in
November:

http://www.freeradius.org/cvs-log/2001/2001-11-30.09:00:00.html
 
> Is there a patch that covers this?  If so, we can get guys to take the
> security hold off of the port.  If not, is there a timeframe to fix?

  It's fixed in the latest CVS snapshot.  We haven't released another
version yet.

  Hmm... we should probably release another version soon.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to