*BSD News Article 54904


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!newsroom.utas.edu.au!munnari.OZ.AU!spool.mu.edu!howland.reston.ans.net!newsfeed.internetmci.com!swrinde!cs.utexas.edu!news.cs.utah.edu!news.cc.utah.edu!park.uvsc.edu!usenet
From: Terry Lambert <terry@lambert.org>
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: Re: What OS for an ISP to use?
Date: 17 Nov 1995 21:05:00 GMT
Organization: Utah Valley State College, Orem, Utah
Lines: 23
Message-ID: <48itds$4ho@park.uvsc.edu>
References: <1995Nov15.130421.1503@hobbes.kzoo.edu> <48dbgq$g4s@agate.berkeley.edu>
NNTP-Posting-Host: hecate.artisoft.com

nickkral@parker.EECS.Berkeley.EDU (Nick Kralevich) wrote:
] Also, security coverage under Linux appears to be more extensive than 
] under FreeBSD.  For example, there was wide coverage in the Linux groups
] and the Linux security mailing lists, regarding the telnetd 
] environment variable security hole (see comp.security.announce for
] more information).  Even those this problem effected FreeBSD,
] there was no discussion in c.u.b.f.m regarding this.  (Note:  this 
] might be due to the wording of the announcement.  I suggest reading the
] alert message before following up to this paragraph).  I didn't see
] any posts in the freebsd newsgroups regarding how to fix this hole,
] or even warning people that this hole existed.

It was discussed on the mailing lists.  No one made a big deal
about it because it was already fixed in the -current working
source tree at the time the advisory was issued (read the whole
advisory, you'll see that FreeBSD -current wasn't vulnerable).


                                        Terry Lambert
                                        terry@cs.weber.edu
---
Any opinions in this posting are my own and not those of my present
or previous employers.