From owner-freebsd-security Thu Jul 4 02:41:54 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id CAA15510 for security-outgoing; Thu, 4 Jul 1996 02:41:54 -0700 (PDT) Received: from ns.kconline.com (ns.kconline.com [207.51.167.3]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id CAA15504 for ; Thu, 4 Jul 1996 02:41:49 -0700 (PDT) Received: from localhost (jriffle@localhost) by ns.kconline.com (8.6.12/8.6.12) with SMTP id EAA03621 for ; Thu, 4 Jul 1996 04:38:43 -0500 Date: Thu, 4 Jul 1996 04:38:43 -0500 (EST) From: Jim Riffle To: freebsd-security@freebsd.org Subject: Anyone have lists of vulnerable FreeBSD programs Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I just started subscribing to this list about a week ago and I am not scared :) Does anyone have a listing programs which come with FreeBSD 2.1.0-Release which are vulnerable and possiable fixes? I am planning on upgrading to 2.1.5 when it is released, which I assume will take care of these vulnerabilities if nobody has a list. Correct? Thanks, Jim