"Scott Pell" <[EMAIL PROTECTED]>wrote: > I am trying to load up the latest snapshot of FreeRadius, but I have > been warned by FreeBSD developers to not run the released version > because of the remotely exploitable buffer overflow security hole.
Yeah, the latest CVS snapshot should be OK. The fix was done in November: http://www.freeradius.org/cvs-log/2001/2001-11-30.09:00:00.html > Is there a patch that covers this? If so, we can get guys to take the > security hold off of the port. If not, is there a timeframe to fix? It's fixed in the latest CVS snapshot. We haven't released another version yet. Hmm... we should probably release another version soon. Alan DeKok. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
