From owner-freebsd-security Thu Feb 22 7:27:30 2001 Delivered-To: freebsd-security@freebsd.org Received: from ringworld.nanolink.com (ringworld.nanolink.com [195.24.48.189]) by hub.freebsd.org (Postfix) with SMTP id 7522637B401 for ; Thu, 22 Feb 2001 07:27:16 -0800 (PST) (envelope-from roam@orbitel.bg) Received: (qmail 6107 invoked by uid 1000); 22 Feb 2001 15:25:09 -0000 Date: Thu, 22 Feb 2001 17:25:09 +0200 From: Peter Pentchev To: George.Giles@mcmail.vanderbilt.edu Cc: freebsd-security@freebsd.org Subject: Re: Bind vulnerability Message-ID: <20010222172509.E440@ringworld.oblivion.bg> Mail-Followup-To: George.Giles@mcmail.vanderbilt.edu, freebsd-security@freebsd.org References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from George.Giles@mcmail.vanderbilt.edu on Thu, Feb 22, 2001 at 09:22:03AM -0600 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, Feb 22, 2001 at 09:22:03AM -0600, George.Giles@mcmail.vanderbilt.edu wrote: > The bind vulnerability has been fixed in 4.2-current ? There is no such thing as 4.2-current. The BIND vulnerability has been fixed in 4.2-STABLE, yes. G'luck, Peter -- If there were no counterfactuals, this sentence would not have been paradoxical. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message