Date: Thu, 30 May 2002 00:58:47 +0100 From: Dominic Marks <dominic_marks@btinternet.com> To: FreeBSD-gnats-submit@FreeBSD.org, freebsd-ports@FreeBSD.org Subject: Re: ports/38716: SECURITY UPDATE: security/fragroute Message-ID: <20020530005847.A343@host217-39-141-165.in-addr.btop> In-Reply-To: <200205292340.g4TNe2722198@freefall.freebsd.org>; from FreeBSD-gnats-submit@FreeBSD.org on Wed, May 29, 2002 at 04:40:02PM -0700 References: <20020529233040.02D6637E@host217-39-111-112.in-addr.btopenworld.com> <200205292340.g4TNe2722198@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, http://www.irssi.org/?page=backdoor Describes the compromise, it only affects machines on which the configure script is executed. The binary itself is unmodified. Thanks! -- Dominic To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020530005847.A343>