Date: Thu, 20 Jan 2000 15:37:24 -0500 From: Mike Tancsa <mike@sentex.net> To: Tom <tom@uniserve.com> Cc: freebsd-security@freebsd.org, freebsd-stable@freebsd.org, security-officer@freebsd.org Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? Message-ID: <3.0.5.32.20000120153724.0206a850@staff.sentex.ca> In-Reply-To: <Pine.BSF.4.02A.10001201232520.26367-100000@shell.uniserve. ca> References: <3.0.5.32.20000120152818.01d7fa40@staff.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
At 12:34 PM 1/20/00 -0800, Tom wrote: > Uhh.. there isn't enough information here to determine anything. That was only a snippet. The poster claims to have contacted the freebsd team and that they were working on it... I just wanted to know if this were the case. Another snippet of the post below. I didnt want to blurt the whole bugtraq posting, as I suspect most people are already subscribed to it. >One thing of note: he also stated this happened on non-freebsd systems, >which is contrary to what the other person said, who was "under the >impression it was freebsd specific." > >I have the source, which I'm not going to post for 2-3 days (give time for >fbsd to work on the fix). If it isn't out before the 21st, I'll post it up. > > ---Mike ------------------------------------------------------------------------ Mike Tancsa, tel +1 519 651 3400 Network Administrator, mike@sentex.net Sentex Communications www.sentex.net Cambridge, Ontario Canada To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.20000120153724.0206a850>