From owner-freebsd-stable@FreeBSD.ORG Thu Jul 8 09:27:39 2004 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D05D816A4CF for ; Thu, 8 Jul 2004 09:27:39 +0000 (GMT) Received: from web40414.mail.yahoo.com (web40414.mail.yahoo.com [66.218.78.111]) by mx1.FreeBSD.org (Postfix) with SMTP id A9D5D43D1D for ; Thu, 8 Jul 2004 09:27:39 +0000 (GMT) (envelope-from amithbc_in@yahoo.com) Message-ID: <20040708092736.42139.qmail@web40414.mail.yahoo.com> Received: from [203.200.201.2] by web40414.mail.yahoo.com via HTTP; Thu, 08 Jul 2004 02:27:36 PDT Date: Thu, 8 Jul 2004 02:27:36 -0700 (PDT) From: amith bc To: freebsd-questions@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii cc: freebsd-stable@FreeBSD.org Subject: free bsd4.4 lite X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Jul 2004 09:27:39 -0000 Hello, We have ported TCP/IP Stack from FreeBSD4.4 Lite to OS/2. We would like to know, if the TCP/IP reset spoofing vulnerability has been taken care in FreeBSD4.4 Lite? We are aware that this vulnerability affects 2.2-stable systems from before September 16, 1998. -stable systems after that date do not suffer from this problem. It will also apply to FreeBSD 2.2.6 and 2.2.7. We would like to know if the patch given in FreeBSD-SA-98_07_rst_asc.htm applies to FreeBSD4.4lite as well? Please help! Regards, Amith __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail