Date: Tue, 5 Apr 2005 21:01:14 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Peter Wemm <peter@wemm.org> Cc: amd64@freebsd.org Subject: Re: HEADS UP: FreeBSD-SA-05:03.amd64 Message-ID: <20050406040114.GA48933@xor.obsecurity.org> In-Reply-To: <200504051833.30708.peter@wemm.org> References: <200504051833.30708.peter@wemm.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--dDRMvlgZJXvWKvBx Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Apr 05, 2005 at 06:33:30PM -0700, Peter Wemm wrote: > In case anybody is not paying attention to -announce, there is a=20 > security fix that has just gone into HEAD, 5.3 and 5.4. >=20 > If you have public or untrusted users or code on your machines, you want= =20 > to get this patched ASAP... >=20 > Note that the upcoming 5.4-RC1 *is* vulnerable and will need to be=20 > patched. RELENG_5_4 has already been patched in CVS, in case anyone is unclear about the status of future release candidates. Kris --dDRMvlgZJXvWKvBx Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQFCU18KWry0BWjoQKURAhpOAKCUygEXhED9Iz/Ztbjv3EfXSYvrfgCgkCo1 lksvke+j36qTh4GrZW1VfwU= =l4SD -----END PGP SIGNATURE----- --dDRMvlgZJXvWKvBx--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050406040114.GA48933>