Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Jun 2002 15:22:26 -0700
From:      Jason DiCioccio <geniusj@bluenugget.net>
To:        Matt Piechota <piechota@argolis.org>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: [openssh-unix-announce] Re: Upcoming OpenSSH vulnerability (fwd)
Message-ID:  <2147483647.1024932146@[192.168.4.154]>
In-Reply-To: <20020624181545.C550-100000@cithaeron.argolis.org>
References:   <20020624181545.C550-100000@cithaeron.argolis.org>

next in thread | previous in thread | raw e-mail | index | archive | help


--On Monday, June 24, 2002 6:18 PM -0400 Matt Piechota 
<piechota@argolis.org> wrote:

> Does this reset OpenBSD's 4-years without a root hole? :)

Probably not.. From what I've seen, that goes based on the latest release, 
and I *think* the latest release of openbsd has privsep enabled by default.

Then again, isn't apache enabled by default on openbsd?  Or just installed 
by default?

--
Jason DiCioccio     - jd@bluenugget.net  - Useless .sig
Open Domain Service - geniusj@ods.org    - http://www.ods.org/
Ruby                - jd@ruby-lang.org   - http://www.ruby-lang.org/

PGP Fingerprint - C442 04E2 26B0 3809 8357  96AB D350 9596 0436 7C08

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2147483647.1024932146>