Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 4 Apr 2001 19:16:26 -0500
From:      Scott Johnson <sjohn@airlinksys.com>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: ntpd =< 4.0.99k remote buffer overflow
Message-ID:  <20010404191626.A6071@ns2.airlinksys.com>
In-Reply-To: <52565.986428557@critter>; from phk@critter.freebsd.dk on Thu, Apr 05, 2001 at 01:55:57AM %2B0200
References:  <3ACBB263.2804E9C2@ursine.com> <52565.986428557@critter>

next in thread | previous in thread | raw e-mail | index | archive | help
Quoth Poul-Henning Kamp on Thu, Apr 05, 2001 at 01:55:57AM +0200:
> 
> This has already been fixed in FreeBSD current & stable an hour
> ago or so.
> 
> Poul-Henning

Is a patch coming for 4.2-RELEASE? Will we just have to install the port
over our system binaries, like we did with bind? In that case, it appears
that just setting PREFIX=/usr won't do to overwrite the system version,
since the port puts its binaries in ${PREFIX}/bin.

-- 
                                 Scott Johnson
                          System/Network Administrator
                                Airlink Systems

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010404191626.A6071>