From owner-freebsd-security Thu Jan 20 12:34:56 2000 Delivered-To: freebsd-security@freebsd.org Received: from mail2.uniserve.com (mail2.uniserve.com [204.244.156.7]) by hub.freebsd.org (Postfix) with ESMTP id 4029115355; Thu, 20 Jan 2000 12:34:50 -0800 (PST) (envelope-from tom@uniserve.com) Received: from shell.uniserve.ca ([204.244.186.218]) by mail2.uniserve.com with smtp (Exim 3.03 #4) id 12BOI4-0006ns-00; Thu, 20 Jan 2000 12:34:48 -0800 Date: Thu, 20 Jan 2000 12:34:45 -0800 (PST) From: Tom X-Sender: tom@shell.uniserve.ca To: Mike Tancsa Cc: freebsd-security@freebsd.org, freebsd-stable@freebsd.org, security-officer@freebsd.org Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? In-Reply-To: <3.0.5.32.20000120152818.01d7fa40@staff.sentex.ca> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 20 Jan 2000, Mike Tancsa wrote: > Can anyone confirm the bugtraq posting ? Are the freebsd folks working on > a fix ? If so, what versions are effected ? > > ---Mike > > >The only log that he could provide was this one: > > > >---snip--- > > > >syslog:Jan 18 12:30:36 x kernel: Kernel panic: Free list empty > > > >---snip--- > > > >One thing of note: he also stated this happened on non-freebsd systems, > >which is contrary to what the other person said, who was "under the > >impression it was freebsd specific." > > > >I have the source, which I'm not going to post for 2-3 days (give time for > >fbsd to work on the fix). If it isn't out before the 21st, I'll post it up. Uhh.. there isn't enough information here to determine anything. > ------------------------------------------------------------------------ > Mike Tancsa, tel +1 519 651 3400 > Network Administrator, mike@sentex.net > Sentex Communications www.sentex.net > Cambridge, Ontario Canada Tom Uniserve To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message