Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Aug 2001 23:29:22 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        William Nunn <yorkie123@hotmail.com>
Cc:        freebsd-questions@FreeBSD.ORG
Subject:   Re: Remotely Exploitable telnetd bug
Message-ID:  <20010813232922.A35008@xor.obsecurity.org>
In-Reply-To: <OE20Sx9x7BEH3PaydnL0000c0db@hotmail.com>; from yorkie123@hotmail.com on Tue, Aug 14, 2001 at 06:48:25AM %2B0100
References:  <OE20Sx9x7BEH3PaydnL0000c0db@hotmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--uAKRQypu60I7Lcqm
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Tue, Aug 14, 2001 at 06:48:25AM +0100, William Nunn wrote:

> I'm planning on buying freebsd, but I saw the news about the bug on
> the site. As of today Aug 14th, If I buy a new jewel case or boxed
> distribution, will it include that security flaw. I know there is a
> patch for it, but I'm interested to know if i'm spared of it.

No, the CDs haven't been reissued.  The next release (4.4) will have
the vulnerability fixed.  It's due out in a few weeks (CDs sometime
later depending on the distributor).

Kris

--uAKRQypu60I7Lcqm
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7eMVCWry0BWjoQKURAkDmAKDeF/0yMXyITfOARbeiAfvuji1NQQCffK7G
L9rUHVYmsLMPTKPbQS9fj7Q=
=HV+h
-----END PGP SIGNATURE-----

--uAKRQypu60I7Lcqm--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010813232922.A35008>