FreeBSD eject Buffer Overflow Vulnerability

One of the following (exerpted from the FreeBSD advisory):

1) Upgrade your entire ports collection and rebuild the eject port.

2) Deinstall the old package and install a new package dated after the
correction date, obtained from:

NOTE: Be sure to check the file creation date on the package, because
the version number of the software has not changed.

3) download a new port skeleton for the eject port from:

and use it to rebuild the port.

4) Use the portcheckout utility to automate option (3) above. The
portcheckout port is available in /usr/ports/devel/portcheckout or the
package can be obtained from:


Privacy Statement
Copyright 2010, SecurityFocus