From owner-freebsd-stable@FreeBSD.ORG Fri Jul 1 18:02:17 2005 Return-Path: X-Original-To: freebsd-stable@FreeBSD.ORG Delivered-To: freebsd-stable@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D28C716A41C for ; Fri, 1 Jul 2005 18:02:17 +0000 (GMT) (envelope-from matt@atopia.net) Received: from neptune.atopia.net (neptune.atopia.net [209.128.231.90]) by mx1.FreeBSD.org (Postfix) with ESMTP id ADD8143D1F for ; Fri, 1 Jul 2005 18:02:17 +0000 (GMT) (envelope-from matt@atopia.net) Received: by neptune.atopia.net (Postfix, from userid 1001) id D528C412D; Fri, 1 Jul 2005 14:02:16 -0400 (EDT) Received: from localhost (localhost [127.0.0.1]) by neptune.atopia.net (Postfix) with ESMTP id C88AC4D for ; Fri, 1 Jul 2005 14:02:16 -0400 (EDT) Date: Fri, 1 Jul 2005 14:02:16 -0400 (EDT) From: Matt Juszczak To: freebsd-stable@FreeBSD.ORG In-Reply-To: <200507011406.j61E6a1f092322@lurza.secnetix.de> Message-ID: <20050701140147.H96932@neptune.atopia.net> References: <200507011406.j61E6a1f092322@lurza.secnetix.de> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: Subject: Re: Possible exploit in 5.4-STABLE X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Jul 2005 18:02:17 -0000 What are the chances of a base 5.4-RELEASE system with PF and securelevel 2 and updated packages being cracked and rooted? Is this something that occurs every day? Or is it difficult?