Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 Apr 2015 10:34:38 +0200
From:      Piotr Kubaj <pkubaj@riseup.net>
To:        freebsd-security@freebsd.org
Cc:        venture37@gmail.com
Subject:   Re: base/release/10.1.0/contrib/file vulnerabilities?
Message-ID:  <553DF49E.3020502@riseup.net>

next in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--uECupdQeNGdn6f8JjMXk6Ij8CXu3lj6TW
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi,

I wrote about this vulnerability in January:
https://lists.freebsd.org/pipermail/freebsd-security/2015-January/008115.=
html

There were only patches for stable.


--uECupdQeNGdn6f8JjMXk6Ij8CXu3lj6TW
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=UPYg
-----END PGP SIGNATURE-----

--uECupdQeNGdn6f8JjMXk6Ij8CXu3lj6TW--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?553DF49E.3020502>