Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 Mar 2004 15:10:43 -0500
From:      "Carlos A. Carnero Delgado" <texel@trinity.icrt.cu>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-04:04.tcp
Message-ID:  <200403021510.44315.texel@trinity.icrt.cu>
In-Reply-To: <20040302120455.S38344@dreadful.org>
References:  <200403021955.i22Jtix2024059@freefall.freebsd.org> <20040302120455.S38344@dreadful.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

On Tuesday 02 March 2004 03:06, Daniel Spielman wrote:
> is FreeBSD 5.2.1 affected by this exploit ?
>
> On Tue, 2 Mar 2004, FreeBSD Security Advisories wrote:
> ...
> > Category:       core
> > Module:         kernel
> > Announced:      2004-03-02
> > Credits:        iDEFENSE
> > Affects:        All FreeBSD releases
> > Corrected:      2004-03-02 17:19:18 UTC (RELENG_4)
> >                 2004-03-02 17:24:46 UTC (RELENG_5_2,
> > 5.2.1-RELEASE-p1) 2004-03-02 17:26:33 UTC (RELENG_4_9,
> > 4.9-RELEASE-p3) 2004-03-02 17:27:47 UTC (RELENG_4_8,
> > 4.8-RELEASE-p16) CVE Name:       CAN-2004-0171
> > FreeBSD only:   NO

it seems so. Look above at it says it was corrected on 2004-03-02 in 
5.2.1-RELEASE-p1.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200403021510.44315.texel>