Date: Mon, 13 Aug 2001 23:29:22 -0700 From: Kris Kennaway <kris@obsecurity.org> To: William Nunn <yorkie123@hotmail.com> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Remotely Exploitable telnetd bug Message-ID: <20010813232922.A35008@xor.obsecurity.org> In-Reply-To: <OE20Sx9x7BEH3PaydnL0000c0db@hotmail.com>; from yorkie123@hotmail.com on Tue, Aug 14, 2001 at 06:48:25AM %2B0100 References: <OE20Sx9x7BEH3PaydnL0000c0db@hotmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--uAKRQypu60I7Lcqm Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Tue, Aug 14, 2001 at 06:48:25AM +0100, William Nunn wrote: > I'm planning on buying freebsd, but I saw the news about the bug on > the site. As of today Aug 14th, If I buy a new jewel case or boxed > distribution, will it include that security flaw. I know there is a > patch for it, but I'm interested to know if i'm spared of it. No, the CDs haven't been reissued. The next release (4.4) will have the vulnerability fixed. It's due out in a few weeks (CDs sometime later depending on the distributor). Kris --uAKRQypu60I7Lcqm Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7eMVCWry0BWjoQKURAkDmAKDeF/0yMXyITfOARbeiAfvuji1NQQCffK7G L9rUHVYmsLMPTKPbQS9fj7Q= =HV+h -----END PGP SIGNATURE----- --uAKRQypu60I7Lcqm-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010813232922.A35008>