From owner-freebsd-net@FreeBSD.ORG Wed Feb 19 19:30:36 2014 Return-Path: Delivered-To: freebsd-net@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0AA6172B; Wed, 19 Feb 2014 19:30:36 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id D233D1AB0; Wed, 19 Feb 2014 19:30:35 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id s1JJUZfC075482; Wed, 19 Feb 2014 19:30:35 GMT (envelope-from brueffer@freefall.freebsd.org) Received: (from brueffer@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s1JJUZ72075481; Wed, 19 Feb 2014 20:30:35 +0100 (CET) (envelope-from brueffer) Date: Wed, 19 Feb 2014 20:30:35 +0100 (CET) Message-Id: <201402191930.s1JJUZ72075481@freefall.freebsd.org> To: brueffer@FreeBSD.org, freebsd-net@FreeBSD.org, maxim@FreeBSD.org From: brueffer@FreeBSD.org Subject: Re: bin/121359: [patch] [security] ppp(8): fix local stack overflow in ppp X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Feb 2014 19:30:36 -0000 Synopsis: [patch] [security] ppp(8): fix local stack overflow in ppp Responsible-Changed-From-To: freebsd-net->maxim Responsible-Changed-By: brueffer Responsible-Changed-When: Wed Feb 19 20:30:04 CET 2014 Responsible-Changed-Why: Maxim has a patch, so assign this to him. http://www.freebsd.org/cgi/query-pr.cgi?pr=121359