Date: Fri, 1 Jul 2005 14:30:50 -0400 From: Kris Kennaway <kris@obsecurity.org> To: Matt Juszczak <matt@atopia.net> Cc: freebsd-stable@FreeBSD.ORG Subject: Re: Possible exploit in 5.4-STABLE Message-ID: <20050701183050.GB99767@xor.obsecurity.org> In-Reply-To: <20050701140147.H96932@neptune.atopia.net> References: <200507011406.j61E6a1f092322@lurza.secnetix.de> <20050701140147.H96932@neptune.atopia.net>
next in thread | previous in thread | raw e-mail | index | archive | help
--xgyAXRrhYN0wYx8y Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Jul 01, 2005 at 02:02:16PM -0400, Matt Juszczak wrote: > What are the chances of a base 5.4-RELEASE system with PF and securelevel= =20 > 2 and updated packages being cracked and rooted? Is this something that= =20 > occurs every day? Or is it difficult? I don't know of any root exploits in 5.4. Kris --xgyAXRrhYN0wYx8y Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (FreeBSD) iD8DBQFCxYvaWry0BWjoQKURAliIAKDosme96PidUhrsJC19nQctVjUfeACeKfv/ s/pnD1kkPHw7eoKQKFEq3Nw= =QVhK -----END PGP SIGNATURE----- --xgyAXRrhYN0wYx8y--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050701183050.GB99767>