Date: Fri, 11 Apr 2014 16:34:53 +0200 From: Erik Trulsson <Erik.Trulsson.1013@student.uu.se> To: sbremal@hotmail.com Cc: freebsd-security@freebsd.org Subject: RE: CVE-2014-0160? Message-ID: <20140411163453.10305uc2u7ijvcst@webmail.uu.se> In-Reply-To: <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl> References: <DUB126-W5BC501CB4B718B4504D74A9540@phx.gbl>, <alpine.DEB.2.00.1404111341450.13520@strudel.ki.iif.hu>, <DUB126-W864CD6C2BD872D72C58222A9540@phx.gbl>, <D0491050-C6C0-4124-966C-3153FB618532@icloud.com> <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl>
next in thread | previous in thread | raw e-mail | index | archive | help
Quoting sbremal@hotmail.com: > I receive daily email from the host which normally shows port audits > and vulnerabilities. However, I did not sport anything related to > CVE-2014-0160 in this email. I expected the same info comes in this > email about the base system as well. > > How do you normally inform about recent vulnerability in the base > system? (I believe newspaper and TV is not the best way...) No, the port audit system does not cover base system vulnerabilities. Security advisories regarding the base systems are supposed to be sent by e-mail to the following mailing lists: FreeBSD-security-notifications@FreeBSD.org FreeBSD-security@FreeBSD.org FreeBSD-announce@FreeBSD.org Personally I would recommend all FreeBSD users to subscribe to the freebsd-announce list at least.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140411163453.10305uc2u7ijvcst>