From owner-freebsd-bugs Wed Apr 4 16: 7:56 2001 Delivered-To: freebsd-bugs@hub.freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 3498B37B725; Wed, 4 Apr 2001 16:07:55 -0700 (PDT) (envelope-from phk@FreeBSD.org) Received: (from phk@localhost) by freefall.freebsd.org (8.11.1/8.11.1) id f34N7sJ79575; Wed, 4 Apr 2001 16:07:54 -0700 (PDT) (envelope-from phk) Date: Wed, 4 Apr 2001 16:07:54 -0700 (PDT) From: Message-Id: <200104042307.f34N7sJ79575@freefall.freebsd.org> To: venglin@freebsd.lublin.pl, phk@FreeBSD.org, freebsd-bugs@FreeBSD.org Subject: Re: bin/26358: [SECURITY] ntpd(8) is vulnerable to remote buffer overflow Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: [SECURITY] ntpd(8) is vulnerable to remote buffer overflow State-Changed-From-To: open->closed State-Changed-By: phk State-Changed-When: Wed Apr 4 16:07:30 PDT 2001 State-Changed-Why: Fixed. A private notice to security-officer@freebsd.org would have been better. http://www.freebsd.org/cgi/query-pr.cgi?pr=26358 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message