Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Apr 2014 16:34:53 +0200
From:      Erik Trulsson <Erik.Trulsson.1013@student.uu.se>
To:        sbremal@hotmail.com
Cc:        freebsd-security@freebsd.org
Subject:   RE: CVE-2014-0160?
Message-ID:  <20140411163453.10305uc2u7ijvcst@webmail.uu.se>
In-Reply-To: <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl>
References:  <DUB126-W5BC501CB4B718B4504D74A9540@phx.gbl>, <alpine.DEB.2.00.1404111341450.13520@strudel.ki.iif.hu>, <DUB126-W864CD6C2BD872D72C58222A9540@phx.gbl>, <D0491050-C6C0-4124-966C-3153FB618532@icloud.com> <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl>

next in thread | previous in thread | raw e-mail | index | archive | help
Quoting sbremal@hotmail.com:

> I receive daily email from the host which normally shows port audits  
> and vulnerabilities. However, I did not sport anything related to  
> CVE-2014-0160 in this email. I expected the same info comes in this  
> email about the base system as well.
>
> How do you normally inform about recent vulnerability in the base  
> system? (I believe newspaper and TV is not the best way...)

No, the port audit system does not cover base system vulnerabilities.

Security advisories regarding the base systems are supposed to be sent by
e-mail to the following mailing lists:

     FreeBSD-security-notifications@FreeBSD.org
     FreeBSD-security@FreeBSD.org
     FreeBSD-announce@FreeBSD.org

Personally I would recommend all FreeBSD users to subscribe to the
freebsd-announce list at least.









Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140411163453.10305uc2u7ijvcst>