[18218] in bugtraq
Re: OpenBSD Security Advisory
daemon@ATHENA.MIT.EDU (Kris Kennaway)
Wed Dec 20 15:57:35 2000
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
protocol="application/pgp-signature"; boundary="zq44+AAfm4giZpo5"
Content-Disposition: inline
Message-Id: <20001219214417.H13474@citusc.usc.edu>
Date: Tue, 19 Dec 2000 21:44:17 -0800
Reply-To: Kris Kennaway <kris@FREEBSD.ORG>
From: Kris Kennaway <kris@FREEBSD.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <200012190133.eBJ1XEM20128@cvs.openbsd.org>; from
aaron@CVS.OPENBSD.ORG on Mon, Dec 18, 2000 at 06:33:14PM -0700
--zq44+AAfm4giZpo5
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Mon, Dec 18, 2000 at 06:33:14PM -0700, Aaron Campbell wrote:
> -------------------------------------------------------------------------=
---
>=20
> AFFECTED SYSTEMS
>=20
> This vulnerability affects OpenBSD versions through 2.8. FreeBSD is
> reportedly not vulnerable. NetBSD is vulnerable to the same bug and a pa=
tch
> was applied to their tree on December 14th.
FreeBSD is not vulnerable.
Kris
--zq44+AAfm4giZpo5
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE6QEcxWry0BWjoQKURAolyAKCTG7KdD2bO7IrUsvqeswC7OZBphwCgwoSe
ZSVKQQW4mZbSHy7Xoq+oSUk=
=vwy4
-----END PGP SIGNATURE-----
--zq44+AAfm4giZpo5--