Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Jul 2004 02:27:36 -0700 (PDT)
From:      amith bc <amithbc_in@yahoo.com>
To:        freebsd-questions@FreeBSD.org
Cc:        freebsd-stable@FreeBSD.org
Subject:   free bsd4.4 lite
Message-ID:  <20040708092736.42139.qmail@web40414.mail.yahoo.com>

next in thread | raw e-mail | index | archive | help
Hello,

We have ported TCP/IP Stack from FreeBSD4.4 Lite to
OS/2. We would like to know, if the TCP/IP reset
spoofing vulnerability has been taken care in
FreeBSD4.4 Lite? We are aware that this vulnerability
affects 2.2-stable systems from before
September 16, 1998.  -stable systems after that date
do not suffer from this problem. It will also apply to
FreeBSD 2.2.6 and 2.2.7.

We would like to know if the patch given in
FreeBSD-SA-98_07_rst_asc.htm applies to FreeBSD4.4lite
as well? 
Please help!

Regards,
Amith



		
__________________________________
Do you Yahoo!?
Yahoo! Mail - You care about security. So do we.
http://promotions.yahoo.com/new_mail



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040708092736.42139.qmail>