Date: Fri, 11 Apr 2014 17:39:27 +0100 From: Tom Evans <tevans.uk@googlemail.com> To: sbremal@hotmail.com Cc: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>, Kimmo Paasiala <kpaasial@icloud.com> Subject: Re: CVE-2014-0160? Message-ID: <CAFHbX1%2B0zpEQcm1apFFxNHsTKHmLuDZX3oNN%2BewxRqLHSckZ_w@mail.gmail.com> In-Reply-To: <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl> References: <DUB126-W5BC501CB4B718B4504D74A9540@phx.gbl> <alpine.DEB.2.00.1404111341450.13520@strudel.ki.iif.hu> <DUB126-W864CD6C2BD872D72C58222A9540@phx.gbl> <D0491050-C6C0-4124-966C-3153FB618532@icloud.com> <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Apr 11, 2014 at 2:26 PM, <sbremal@hotmail.com> wrote: > I receive daily email from the host which normally shows port audits and vulnerabilities. However, I did not sport anything related to CVE-2014-0160 in this email. I expected the same info comes in this email about the base system as well. > > How do you normally inform about recent vulnerability in the base system? (I believe newspaper and TV is not the best way...) If you use or administer FreeBSD you should subscribe to (and read daily!) security@ and stable@. Cheers Tom
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAFHbX1%2B0zpEQcm1apFFxNHsTKHmLuDZX3oNN%2BewxRqLHSckZ_w>