Date: Mon, 24 Jun 2002 15:22:26 -0700 From: Jason DiCioccio <geniusj@bluenugget.net> To: Matt Piechota <piechota@argolis.org> Cc: freebsd-security@FreeBSD.ORG Subject: Re: [openssh-unix-announce] Re: Upcoming OpenSSH vulnerability (fwd) Message-ID: <2147483647.1024932146@[192.168.4.154]> In-Reply-To: <20020624181545.C550-100000@cithaeron.argolis.org> References: <20020624181545.C550-100000@cithaeron.argolis.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--On Monday, June 24, 2002 6:18 PM -0400 Matt Piechota <piechota@argolis.org> wrote: > Does this reset OpenBSD's 4-years without a root hole? :) Probably not.. From what I've seen, that goes based on the latest release, and I *think* the latest release of openbsd has privsep enabled by default. Then again, isn't apache enabled by default on openbsd? Or just installed by default? -- Jason DiCioccio - jd@bluenugget.net - Useless .sig Open Domain Service - geniusj@ods.org - http://www.ods.org/ Ruby - jd@ruby-lang.org - http://www.ruby-lang.org/ PGP Fingerprint - C442 04E2 26B0 3809 8357 96AB D350 9596 0436 7C08 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2147483647.1024932146>