From owner-freebsd-questions@FreeBSD.ORG Mon Sep 2 17:39:02 2013 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 71767248 for ; Mon, 2 Sep 2013 17:39:02 +0000 (UTC) (envelope-from freebsd-questions-local@be-well.ilk.org) Received: from be-well.ilk.org (be-well.ilk.org [23.30.133.173]) by mx1.freebsd.org (Postfix) with ESMTP id 49A1324E5 for ; Mon, 2 Sep 2013 17:39:02 +0000 (UTC) Received: from lowell-desk.lan (lowell-desk.lan [172.30.250.41]) by be-well.ilk.org (Postfix) with ESMTP id 32DCC33C25 for ; Mon, 2 Sep 2013 13:38:56 -0400 (EDT) Received: by lowell-desk.lan (Postfix, from userid 1147) id 3BEFF39841; Mon, 2 Sep 2013 13:38:53 -0400 (EDT) From: Lowell Gilbert To: FreeBSD Subject: Re: Potential Vulnerabilities list on US Cert References: <20130902104144.47602638@scorpio> Date: Mon, 02 Sep 2013 13:38:53 -0400 In-Reply-To: <20130902104144.47602638@scorpio> (jerry@seibercom.net's message of "Mon, 2 Sep 2013 10:41:44 -0400") Message-ID: <447geznmxe.fsf@lowell-desk.lan> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 Sep 2013 17:39:02 -0000 These are the sctp vulnerabilitiese from a week or two back. Anyone following the Security Advisories can safely ignore these; they were issued after the relevant advisories and patches, and consist of nothing but pointers to the previous information.