[18218] in bugtraq

home help back first fref pref prev next nref lref last post

Re: OpenBSD Security Advisory

daemon@ATHENA.MIT.EDU (Kris Kennaway)
Wed Dec 20 15:57:35 2000

Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
              protocol="application/pgp-signature"; boundary="zq44+AAfm4giZpo5"
Content-Disposition: inline
Message-Id:  <20001219214417.H13474@citusc.usc.edu>
Date:         Tue, 19 Dec 2000 21:44:17 -0800
Reply-To: Kris Kennaway <kris@FREEBSD.ORG>
From: Kris Kennaway <kris@FREEBSD.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200012190133.eBJ1XEM20128@cvs.openbsd.org>; from
              aaron@CVS.OPENBSD.ORG on Mon, Dec 18, 2000 at 06:33:14PM -0700

--zq44+AAfm4giZpo5
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mon, Dec 18, 2000 at 06:33:14PM -0700, Aaron Campbell wrote:

> -------------------------------------------------------------------------=
---
>=20
> AFFECTED SYSTEMS
>=20
> This vulnerability affects OpenBSD versions through 2.8.  FreeBSD is
> reportedly not vulnerable.  NetBSD is vulnerable to the same bug and a pa=
tch
> was applied to their tree on December 14th.

FreeBSD is not vulnerable.

Kris

--zq44+AAfm4giZpo5
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6QEcxWry0BWjoQKURAolyAKCTG7KdD2bO7IrUsvqeswC7OZBphwCgwoSe
ZSVKQQW4mZbSHy7Xoq+oSUk=
=vwy4
-----END PGP SIGNATURE-----

--zq44+AAfm4giZpo5--

home help back first fref pref prev next nref lref last post