From owner-freebsd-security Mon Dec 21 20:03:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA17254 for freebsd-security-outgoing; Mon, 21 Dec 1998 20:03:07 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from roble.com (gw4.roble.com [199.108.85.10]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA17247 for ; Mon, 21 Dec 1998 20:03:05 -0800 (PST) (envelope-from sendmail@roble.com) Received: from roble3.roble.com (roble3.roble.com [207.5.40.53]) by roble.com (Roble1b) with SMTP id UAA04346 for ; Mon, 21 Dec 1998 20:03:05 -0800 (PST) Date: Mon, 21 Dec 1998 20:03:01 -0800 (PST) From: Roger Marquis X-Sender: Roger Marquis Reply-To: Roger Marquis To: security@FreeBSD.ORG Subject: CERT CA-98-13, patch needed In-Reply-To: <199812211511.HAA02961@hub.freebsd.org> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The just released CERT advisory (CA-98-13) indicates certain FreeBSD systems are vulnerable to IP DOS attacks, namely: FreeBSD versions prior to 2.2.8 are vulnerable. FreeBSD 3.0 is also vulnerable. FreeBSD 3.0-current as of 1998/11/12 is not vulnerable. --- A patch is available at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/CA-98-13/patch Unfortunately, the patch at this URL seems to have invalid formatting characters (=3D). Does anyone have a valid patch for this advisory? Roger Marquis Roble Systems Consulting http://www.roble.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message