From owner-freebsd-security Tue Mar 12 00:56:12 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id AAA16256 for security-outgoing; Tue, 12 Mar 1996 00:56:12 -0800 (PST) Received: from falcon.tioga.com (root@falcon.tioga.com [205.146.65.5]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id AAA16203 for ; Tue, 12 Mar 1996 00:56:04 -0800 (PST) Received: (from tbalfe@localhost) by falcon.tioga.com (8.6.12/8.6.12) id DAA05368; Tue, 12 Mar 1996 03:56:30 GMT Date: Tue, 12 Mar 1996 03:56:30 +0000 () From: Thomas J Balfe To: freebsd-security@freebsd.org Subject: CA-95:14 Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Does 2.1R have the RFC 1408 or RFC 1572 telnetd_environment_vulnerability bug worked out of it, or do I have to apply a patch? Are there any other things that I should apply to 2.1R? Thanks. TheLion #freebsd -- Thomas J Balfe Tioga Communications, Inc. tbalfe@tioga.com