Date: Tue, 04 May 1999 14:52:12 -0600 From: Warner Losh <imp@harmony.village.org> To: Brett Glass <brett@lariat.org> Cc: "David G. Andersen" <danderse@cs.utah.edu>, security@FreeBSD.ORG Subject: Re: Claimed remote reboot exploit: Real or bogus? Message-ID: <199905042052.OAA04643@harmony.village.org> In-Reply-To: Your message of "Mon, 03 May 1999 17:29:20 MDT." <4.2.0.37.19990503172000.04f63ee0@localhost> References: <4.2.0.37.19990503172000.04f63ee0@localhost> <Brett Glass's message of Mon, May 3 1999 <4.2.0.37.19990503171021.04dd6630@localhost> <4.2.0.37.19990503171021.04dd6630@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <4.2.0.37.19990503172000.04f63ee0@localhost> Brett Glass writes: : Still, the release of 3.2-R is nigh, and we DO want to install that : one. So, we'd like to see the exploit identified and squashed before : 3.2-R goes out the door. I'm real keen on that as well. If anybody gets a copy of an exploit, please forward it to the security officer with explicit instructions on how to run it. I've had a few exploits come accross recently that have said they were bad, but weren't trivial to run. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199905042052.OAA04643>