Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 1 Jul 2005 14:30:50 -0400
From:      Kris Kennaway <kris@obsecurity.org>
To:        Matt Juszczak <matt@atopia.net>
Cc:        freebsd-stable@FreeBSD.ORG
Subject:   Re: Possible exploit in 5.4-STABLE
Message-ID:  <20050701183050.GB99767@xor.obsecurity.org>
In-Reply-To: <20050701140147.H96932@neptune.atopia.net>
References:  <200507011406.j61E6a1f092322@lurza.secnetix.de> <20050701140147.H96932@neptune.atopia.net>

next in thread | previous in thread | raw e-mail | index | archive | help

--xgyAXRrhYN0wYx8y
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Fri, Jul 01, 2005 at 02:02:16PM -0400, Matt Juszczak wrote:
> What are the chances of a base 5.4-RELEASE system with PF and securelevel=
=20
> 2 and updated packages being cracked and rooted?  Is this something that=
=20
> occurs every day?  Or is it difficult?

I don't know of any root exploits in 5.4.

Kris

--xgyAXRrhYN0wYx8y
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFCxYvaWry0BWjoQKURAliIAKDosme96PidUhrsJC19nQctVjUfeACeKfv/
s/pnD1kkPHw7eoKQKFEq3Nw=
=QVhK
-----END PGP SIGNATURE-----

--xgyAXRrhYN0wYx8y--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050701183050.GB99767>