tech-crypto archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: RSAREF2 buffer overflow?



        Can we update the rsaref version to rsaref-2.0p3 - that way people
        can immediately determine if they are running the latest version
        by just running 'pkg_info rsaref'.

                David/absolute

On Tue, 14 Dec 1999, Bill Sommerfeld wrote:

> Ok, the fix from CERT CA-99-15 is now merged into the appropriate
> patch in pkgsrc..
> 
> David:
> 
> Text for the website:
> 
> RSAREF2 Library Buffer Overruns Fixed.
> 
> Recently, there have been several buffer overruns discovered in the
> RSAREF library.  Shortly after the bugtraq post reporting this problem
> was released, the fix supplied in that post was added to pkgsrc.
> 
> However, as the CERT advisory CA-99-15 states:
> 
>    We believe the patch originally provided by Core SDI in their
>    advisory may not be a complete fix to this particular problem.
> 
> Correspondingly, the revised fix referenced by the advisory has been
> applied to NetBSD's pkgsrc distribution and is present in
> pkgsrc/security/rsaref/patch-ah revision 1.3 and later.  NetBSD users
> who use packages depending on rsaref should fetch the most recent
> pkgsrc bits as soon as practical and rebuild packages, including ssh,
> which depend on rsaref.
> 
> --- [ end ] ---
> 
> Note that the fix won't be available for anonymous download until sup
> and anoncvs pull the fix (i'm not sure how frequently this is..)
> 
>                                       - Bill
> 




Home | Main Index | Thread Index | Old Index