From owner-freebsd-security Wed Feb 27 9:29:19 2002 Delivered-To: freebsd-security@freebsd.org Received: from C-Tower.Area51.DK (c-tower.area51.dk [212.242.89.130]) by hub.freebsd.org (Postfix) with SMTP id 183CA37B402 for ; Wed, 27 Feb 2002 09:29:15 -0800 (PST) Received: (qmail 54621 invoked by uid 1007); 27 Feb 2002 17:29:13 -0000 Date: Wed, 27 Feb 2002 17:29:13 +0000 From: Alex Holst To: security@FreeBSD.ORG Subject: Re: apache/PHP4.1.1 Message-ID: <20020227172913.GA54158@area51.dk> References: <200202271720.g1RHK0M08880@probsd.ws> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline In-Reply-To: <200202271720.g1RHK0M08880@probsd.ws> User-Agent: Mutt/1.3.27i Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Quoting Michael Sharp (mds@ec.rr.com): > I dont see this exploit on the 4.5-RELEASE Errata site or is it so new that > its not up yet? I guess I should CVSup my ports Why would there be an *exploit* on the errata page? There will eventually be an advisory pointing to a fix, I'm sure, but there will probably never an exploit posted to the errata page. -- I prefer the dark of the night, after midnight and before four-thirty, when it's more bare, more hollow. http://a.area51.dk/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message