From owner-freebsd-security Tue Jul 2 18:18:35 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 944BF37B400 for ; Tue, 2 Jul 2002 18:18:31 -0700 (PDT) Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by mx1.FreeBSD.org (Postfix) with ESMTP id 045E943E4A for ; Tue, 2 Jul 2002 18:18:31 -0700 (PDT) (envelope-from des@ofug.org) Received: by flood.ping.uio.no (Postfix, from userid 2602) id E74E7534D; Wed, 3 Jul 2002 03:18:28 +0200 (CEST) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: Matthew Dillon Cc: "Peter Brezny" , Subject: Re: CERT Advisory CA-2002-18 OpenSSH Vulnerabilities in Challenge Response References: <200207030109.g6319Ufb008965@apollo.backplane.com> From: Dag-Erling Smorgrav Date: 03 Jul 2002 03:18:28 +0200 In-Reply-To: <200207030109.g6319Ufb008965@apollo.backplane.com> Message-ID: Lines: 12 User-Agent: Gnus/5.0808 (Gnus v5.8.8) Emacs/21.2 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Matthew Dillon writes: > My question is simple: Is the named in -stable currently vulnerable or > has it been fixed? I know the port is fixed. What about the named > sitting in -stable? As far as I know, named itself is not vulnerable, but libbind contains the bug, and software that uses libbind's gethost*() (nothing in the base system does) is vulnerable. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message