Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 Jan 2001 14:04:47 -0800
From:      Alfred Perlstein <bright@wintelcom.net>
To:        Roman Shterenzon <roman@xpert.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind
Message-ID:  <20010131140447.E26076@fw.wintelcom.net>
In-Reply-To: <Pine.LNX.4.30.0101312352150.3617-100000@jamus.xpert.com>; from roman@xpert.com on Wed, Jan 31, 2001 at 11:55:18PM %2B0200
References:  <200101312123.f0VLNL134920@freefall.freebsd.org> <Pine.LNX.4.30.0101312352150.3617-100000@jamus.xpert.com>

next in thread | previous in thread | raw e-mail | index | archive | help
* Roman Shterenzon <roman@xpert.com> [010131 13:56] wrote:
> On Wed, 31 Jan 2001, FreeBSD Security Advisories wrote:
> 
> > =============================================================================
> > FreeBSD-SA-01:18                                           Security Advisory
> >
> > Topic:          BIND remotely exploitable buffer overflow
> ..snip..
> 
> Why not make it default in the base system?

It has been, but only for several days.

-- 
-Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org]
"I have the heart of a child; I keep it in a jar on my desk."


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010131140447.E26076>