From owner-freebsd-security Wed Feb 27 9:19:20 2002 Delivered-To: freebsd-security@freebsd.org Received: from probsd.ws (ilm25-53-085.ec.rr.com [24.25.53.85]) by hub.freebsd.org (Postfix) with ESMTP id DA6AF37B438 for ; Wed, 27 Feb 2002 09:18:42 -0800 (PST) Received: by probsd.ws (8.11.6/8.11.6) id g1RHK0M08880 for security@FreeBSD.ORG; Wed, 27 Feb 2002 12:20:00 -0500 (EST) (envelope-from freebsd) Message-Id: <200202271720.g1RHK0M08880@probsd.ws> Content-Type: text/plain; charset="iso-8859-1" From: Michael Sharp To: security@FreeBSD.ORG Subject: apache/PHP4.1.1 Date: Wed, 27 Feb 2002 12:20:00 -0500 X-Mailer: KMail [version 1.3.2] MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org I dont see this exploit on the 4.5-RELEASE Errata site or is it so new that its not up yet? I guess I should CVSup my ports michael To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message