Date: Thu, 8 Jul 2004 02:27:36 -0700 (PDT) From: amith bc <amithbc_in@yahoo.com> To: freebsd-questions@FreeBSD.org Cc: freebsd-stable@FreeBSD.org Subject: free bsd4.4 lite Message-ID: <20040708092736.42139.qmail@web40414.mail.yahoo.com>
next in thread | raw e-mail | index | archive | help
Hello, We have ported TCP/IP Stack from FreeBSD4.4 Lite to OS/2. We would like to know, if the TCP/IP reset spoofing vulnerability has been taken care in FreeBSD4.4 Lite? We are aware that this vulnerability affects 2.2-stable systems from before September 16, 1998. -stable systems after that date do not suffer from this problem. It will also apply to FreeBSD 2.2.6 and 2.2.7. We would like to know if the patch given in FreeBSD-SA-98_07_rst_asc.htm applies to FreeBSD4.4lite as well? Please help! Regards, Amith __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040708092736.42139.qmail>