From owner-freebsd-questions Fri Jul 26 09:42:30 1996 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id JAA07116 for questions-outgoing; Fri, 26 Jul 1996 09:42:30 -0700 (PDT) Received: from rocky.mt.sri.com (rocky.mt.sri.com [206.127.76.100]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id JAA07109 for ; Fri, 26 Jul 1996 09:42:27 -0700 (PDT) Received: (from nate@localhost) by rocky.mt.sri.com (8.7.5/8.7.3) id KAA11584; Fri, 26 Jul 1996 10:42:04 -0600 (MDT) Date: Fri, 26 Jul 1996 10:42:04 -0600 (MDT) Message-Id: <199607261642.KAA11584@rocky.mt.sri.com> From: Nate Williams To: Lars Koeller Cc: rashid@rk.ios.com, freebsd-questions@freefall.freebsd.org Subject: Re: Which CERT advisories are fixed in 2.1.5? In-Reply-To: <199607261614.SAA02512@odie.physik2.uni-rostock.de> References: <199607261614.SAA02512@odie.physik2.uni-rostock.de> Sender: owner-questions@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > Yes, I know, but e.g. where can I get the info if the suidperl or the > rdist problem is fixed in 2.1.5? It's fixed. The CERT advisory states that all FreeBSD versions 'prior' to a certain date are vulnerable. That date precedes 2.1.5, so it's no vulnerable. Nate