Date: Wed, 17 Sep 1997 12:14:29 -0600 (MDT) From: Nate Williams <nate@mt.sri.com> To: Simon Shapiro <Shimon@i-connect.net> Cc: freebsd-security@freebsd.org Subject: Re: FW: CERT Advisory CA-97.23 - rdist (fwd) Message-ID: <199709171814.MAA07110@rocky.mt.sri.com> In-Reply-To: <XFMail.970917090526.Shimon@i-Connect.Net> References: <XFMail.970917090526.Shimon@i-Connect.Net>
next in thread | previous in thread | raw e-mail | index | archive | help
Simon Shapiro writes: > I know we have a (much) superior O/S, but it never hurts to ask. Right? > > Simon Did you read the advisory? .... > B. Obtain and install the appropriate patch > > Below is a list of vendors who have provided information for this > advisory. Details are in Appendix A, and we will update the appendix > as we receive more information. > ... > FreeBSD, Inc. ... > FreeBSD, Inc. > ============= > 2.1.0 is vulnerable. > 2.1.5, 2.1.6 and 2.1.7 are and 2.1-stable are not. In any case, upgrading > to 2.1.7 or even better, 2.1-stable should be considered. > If there is demand, we'll release a patch for 2.1.0 > > All 2.2 releases, 2.2-stable and FreeBSD-current are not vulnerable. *Sheesh*, how more obvious can it be? Nate
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199709171814.MAA07110>