Date: Tue, 6 Nov 2001 13:59:28 -0800 From: Kris Kennaway <kris@obsecurity.org> To: RJ45 <rj45@slacknet.com> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: lpd vulnerability Message-ID: <20011106135928.C32267@xor.obsecurity.org> In-Reply-To: <Pine.LNX.4.21.0111060440320.15088-100000@slacknet.slacknet.com>; from rj45@slacknet.com on Tue, Nov 06, 2001 at 04:41:33AM -0700 References: <Pine.LNX.4.21.0111060440320.15088-100000@slacknet.slacknet.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--b5gNqxB1S1yM7hjW Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Nov 06, 2001 at 04:41:33AM -0700, RJ45 wrote: >=20 > Does the lpd vulnerability at > ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01%3A58.lpd.= asc > affect also 4.4-RELEASE ?? Guess you didn't actually read that advisory, huh? ---- All versions of FreeBSD prior to the correction date including FreeBSD 4.3 contain this problem. The base system that will ship with FreeBSD 4.4 does not contain this problem since it was corrected before the release. ---- Kris --b5gNqxB1S1yM7hjW Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE76F1AWry0BWjoQKURAss3AJoDzO67hXYceEVtjPeQUwzLOhg4oQCgjnwc /tpywnAO7l/sh8bzmz+z5Sg= =QT+8 -----END PGP SIGNATURE----- --b5gNqxB1S1yM7hjW-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011106135928.C32267>