Subject: Re: NetBSD Security Advisory 2001-001
To: None <current-users@netbsd.org>
From: Ari Gordon-Schlosberg <regs@nebcorp.com>
List: current-users
Date: 02/11/2001 23:26:47
[Nick <nmanisca@vt.edu>]
> On Sun, Feb 11, 2001 at 02:22:35PM +1100, NetBSD Security Officer wrote:
> >
> > -----BEGIN PGP SIGNED MESSAGE-----
> >
> > NetBSD Security Advisory 2001-001
> > =================================
> >
> > Topic: Multiple BIND vulnerabilities
> > Version: All release versions of NetBSD, and NetBSD-current
> > Severity: Remote root execution of commands is possible
> > Fixed: NetBSD-current: January 27, 2001
> > NetBSD 1.5 branch: January 28, 2001
> > NetBSD 1.4 branch: January 28, 2001
>
> I hope that this one doesn't come off as bashing or ranting...
>
> Maybe I am not reading the right mailing lists, but doesn't it seem
> like the NetBSD user community should hear about this sort of thing
> sooner? I've been seeing noise on Bugtraq about it for a while now
> but I never saw a NetBSD Sec. Advisory until today. It makes me
> sort of uneasy to know these vulnerabilities were common knowledge
> for so long without an advisory.
>
> Is it a bad idea to rely on the NetBSD Security Advisories to keep
> up-to-date on vulnerabilites in NetBSD?
CERT issued a warning in cooridination with ISC. Anyone who is concerned
about security should *not* be relying on the vendor to give them timely
notice. If you are concerned with getting "zero-day" security info,
subscribe to bugtraq, CERT mailing lists, and security mailing lists for
the vendors of individual packages.
--
Ari there is no spoon
-------------------------------------------------------------------------
http://www.nebcorp.com/~regs/pgp for PGP public key