From owner-freebsd-stable Wed Mar 26 14:48:26 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id OAA06506 for stable-outgoing; Wed, 26 Mar 1997 14:48:26 -0800 (PST) Received: from shrimp.dataplex.net (shrimp.dataplex.net [208.2.87.3]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id OAA06464; Wed, 26 Mar 1997 14:48:01 -0800 (PST) Received: from [204.69.236.50] (GATEWAY.SKIPSTONE.COM [198.214.10.129]) by shrimp.dataplex.net (8.8.5/8.8.5) with SMTP id QAA03662; Wed, 26 Mar 1997 16:47:56 -0600 (CST) Date: 26 Mar 97 16:50:03 -0600 Subject: Re: FreeBSD-SA-97:02: Buffer overflow in lpd From: "Richard Wackerbarth" To: "FreeBSD Security Officer" Cc: stable@freebsd.org X-Mailer: Cyberdog/2.0b1 MIME-Version: 1.0 Message-Id: Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-stable@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Wed, Mar 26, 1997 3:37 PM, FreeBSD Security Officer wrote: >FreeBSD-SA-97:02 Security Advisory ... >Affects: FreeBSD 2.1.7 and earlier and FreeBSD 2.2 snapshots > before 1997/02/25 suffer from this problem. >Corrected: FreeBSD-current as of 1997/02/25 > FreeBSD 2.2 as of 1997/02/25 May I ask why you failed to include this correction in our 2.1 distribution? That is still the "stable" branch and SHOULD receive this kind of support at least until 2.2 gains some maturity in the real world.