Return to BSD News archive
Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!nntp.coast.net!howland.reston.ans.net!gatech!news.mathworks.com!news.kei.com!news.texas.net!news.sprintlink.net!news-fw-6.sprintlink.net!helena.MT.net!nate From: nate@trout.mt.sri.com (Nate Williams) Newsgroups: comp.unix.bsd.freebsd.misc Subject: Re: Fixed in 2.1.5R? Re: CERT Vendor-Initiated Bulletin VB-96.11 - FreeBSD, Inc. Date: 15 Jul 1996 16:51:06 GMT Organization: SRI Intl. - Montana Operations Lines: 31 Message-ID: <4sdstq$omm@helena.MT.net> References: <4s3o4k$m5u@news.sei.cmu.edu> <4sdja1$4rf@infoborg.dmacc.cc.ia.us> Reply-To: "Nate Williams" <nate@sneezy.sri.com> NNTP-Posting-Host: trout.mt.sri.com Keywords: security CERT In article <4sdja1$4rf@infoborg.dmacc.cc.ia.us>, Charles F. Randall <crandall@dmacc.cc.ia.us> wrote: >This was posted to comp.security.announce. ... >============================================================================= >CERT(sm) Vendor-Initiated Bulletin VB-96.11 >July 11, 1996 > >Topic: security compromise from ppp >Source: FreeBSD, Inc. .... >Are these patches already applied to 2.1.5R? *smart-alec answer* What do you think? Do you think we would provide patches but not apply them to the development sources and therefore ship insecure systems on purpose? *true answer* Of course they are applied. Nate -- nate@sri.com | Research Engineer, SRI Intl. - Montana Operations nate@trout.mt.sri.com | Loving life in God's country, the great state of work #: (406) 449-7662 | Montana (all the crazies are now in jail 'cept us home #: (406) 443-7063 | natives). - Fly fishing fanatic!