Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 Jan 2001 15:25:18 -0800 (PST)
From:      Brian <bri@sonicboom.org>
To:        Alfred Perlstein <bright@wintelcom.net>
Cc:        Roman Shterenzon <roman@xpert.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind
Message-ID:  <Pine.BSF.4.21.0101311524480.39702-100000@cx175057-a.ocnsd1.sdca.home.com>
In-Reply-To: <20010131140447.E26076@fw.wintelcom.net>

next in thread | previous in thread | raw e-mail | index | archive | help
I downloaded ports this am, and it was not the default at that point, on
cvsup10.

	Bri

On Wed, 31 Jan 2001, Alfred Perlstein wrote:

> * Roman Shterenzon <roman@xpert.com> [010131 13:56] wrote:
> > On Wed, 31 Jan 2001, FreeBSD Security Advisories wrote:
> > 
> > > =============================================================================
> > > FreeBSD-SA-01:18                                           Security Advisory
> > >
> > > Topic:          BIND remotely exploitable buffer overflow
> > ..snip..
> > 
> > Why not make it default in the base system?
> 
> It has been, but only for several days.
> 
> -- 
> -Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org]
> "I have the heart of a child; I keep it in a jar on my desk."
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0101311524480.39702-100000>