Date: Wed, 31 Jan 2001 15:25:18 -0800 (PST) From: Brian <bri@sonicboom.org> To: Alfred Perlstein <bright@wintelcom.net> Cc: Roman Shterenzon <roman@xpert.com>, freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind Message-ID: <Pine.BSF.4.21.0101311524480.39702-100000@cx175057-a.ocnsd1.sdca.home.com> In-Reply-To: <20010131140447.E26076@fw.wintelcom.net>
next in thread | previous in thread | raw e-mail | index | archive | help
I downloaded ports this am, and it was not the default at that point, on cvsup10. Bri On Wed, 31 Jan 2001, Alfred Perlstein wrote: > * Roman Shterenzon <roman@xpert.com> [010131 13:56] wrote: > > On Wed, 31 Jan 2001, FreeBSD Security Advisories wrote: > > > > > ============================================================================= > > > FreeBSD-SA-01:18 Security Advisory > > > > > > Topic: BIND remotely exploitable buffer overflow > > ..snip.. > > > > Why not make it default in the base system? > > It has been, but only for several days. > > -- > -Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org] > "I have the heart of a child; I keep it in a jar on my desk." > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0101311524480.39702-100000>