Date: Tue, 2 Mar 2004 15:10:43 -0500 From: "Carlos A. Carnero Delgado" <texel@trinity.icrt.cu> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-04:04.tcp Message-ID: <200403021510.44315.texel@trinity.icrt.cu> In-Reply-To: <20040302120455.S38344@dreadful.org> References: <200403021955.i22Jtix2024059@freefall.freebsd.org> <20040302120455.S38344@dreadful.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, On Tuesday 02 March 2004 03:06, Daniel Spielman wrote: > is FreeBSD 5.2.1 affected by this exploit ? > > On Tue, 2 Mar 2004, FreeBSD Security Advisories wrote: > ... > > Category: core > > Module: kernel > > Announced: 2004-03-02 > > Credits: iDEFENSE > > Affects: All FreeBSD releases > > Corrected: 2004-03-02 17:19:18 UTC (RELENG_4) > > 2004-03-02 17:24:46 UTC (RELENG_5_2, > > 5.2.1-RELEASE-p1) 2004-03-02 17:26:33 UTC (RELENG_4_9, > > 4.9-RELEASE-p3) 2004-03-02 17:27:47 UTC (RELENG_4_8, > > 4.8-RELEASE-p16) CVE Name: CAN-2004-0171 > > FreeBSD only: NO it seems so. Look above at it says it was corrected on 2004-03-02 in 5.2.1-RELEASE-p1.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200403021510.44315.texel>