Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Apr 2014 17:39:27 +0100
From:      Tom Evans <tevans.uk@googlemail.com>
To:        sbremal@hotmail.com
Cc:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>, Kimmo Paasiala <kpaasial@icloud.com>
Subject:   Re: CVE-2014-0160?
Message-ID:  <CAFHbX1%2B0zpEQcm1apFFxNHsTKHmLuDZX3oNN%2BewxRqLHSckZ_w@mail.gmail.com>
In-Reply-To: <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl>
References:  <DUB126-W5BC501CB4B718B4504D74A9540@phx.gbl> <alpine.DEB.2.00.1404111341450.13520@strudel.ki.iif.hu> <DUB126-W864CD6C2BD872D72C58222A9540@phx.gbl> <D0491050-C6C0-4124-966C-3153FB618532@icloud.com> <DUB126-W77A08013F5277DB2C69816A9540@phx.gbl>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Apr 11, 2014 at 2:26 PM,  <sbremal@hotmail.com> wrote:
> I receive daily email from the host which normally shows port audits and vulnerabilities. However, I did not sport anything related to CVE-2014-0160 in this email. I expected the same info comes in this email about the base system as well.
>
> How do you normally inform about recent vulnerability in the base system? (I believe newspaper and TV is not the best way...)

If you use or administer FreeBSD you should subscribe to (and read
daily!) security@ and stable@.

Cheers

Tom



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAFHbX1%2B0zpEQcm1apFFxNHsTKHmLuDZX3oNN%2BewxRqLHSckZ_w>