Date: Sat, 24 Oct 1998 12:07:47 +0930 (CST) From: Kris Kennaway <kkennawa@physics.adelaide.edu.au> To: current@FreeBSD.ORG Subject: nestea v2 against freebsd 3.0-Release (fwd) Message-ID: <Pine.OSF.4.05.9810241203460.76-100000@mercury.physics.adelaide.edu.au>
next in thread | raw e-mail | index | archive | help
I tested this against myself this morning and it panicked the machine - I had to run as root to hit the 127.0.0.1 target, but perhaps someone could confirm whether it works against remote machines? This is obviously not good to have amajor vulnerability in 3.0 known before it even ships out the door :-( Kris ---------- Forwarded message ---------- Date: Fri, 23 Oct 1998 09:41:23 +0200 From: Gilles Bruno <Gilles.Bruno@ujf-grenoble.fr> To: freebsd-security@freebsd.org Subject: nestea v2 against freebsd 3.0-Release Hi everyone, we tested yesterday the old nestea v2 against a brand new 3.0-Release : it has prooved to be effective against it (the box rebooted - invalid page fault while in kernel mode). The same test against 2.2.[6,7]-Release didn't harm at all. Am I missing something ? some sysctl ? a special kernel config ? Let us know... To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.OSF.4.05.9810241203460.76-100000>