Date: Mon, 23 May 2005 11:27:12 -0500 From: Jacques Vidrine <nectar@FreeBSD.org> To: Christian Brueffer <chris@unixpages.org> Cc: security@freebsd.org Subject: Re: TCP timestamp vulnerability Message-ID: <97D5BFC7-D07D-4DB5-A6C2-D4C71C679CA4@FreeBSD.org> In-Reply-To: <20050519105313.GC2724@unixpages.org> References: <20050519105313.GC2724@unixpages.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On May 19, 2005, at 5:53 AM, Christian Brueffer wrote: > Hi, > > fixes for the vulnerability described in http://www.kb.cert.org/ > vuls/id/637934 > were checked in to CURRENT and RELENG_5 by ps in April. > > http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/tcp_input.c > > Revisions 1.270 and 1.252.2.16 > > He didn't commit it to RELENG_5_4 for some reason, so 5.4 shipped with > it. > > My guess is that he didn't notify you guys either. > > I stumbled upon this through a Heise News article at > http://www.heise.de/newsticker/meldung/59672. Sent them an update > about > the fixed branches, but they'd like to know why this wasn't > communicated > back to US-CERT yadda yadda yadda. Thanks, Christian. No, ps@ didn't point it out. It gets a little confusing too, since I see that the work was submitted by multiple folks, one of which reported another related vulnerability to us on May 18 (7 days after that commit). Now to try to untangle what is what ... -- Jacques A Vidrine / NTT/Verio nectar@celabo.org / jvidrine@verio.net / nectar@freebsd.org [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (Darwin) iD8DBQFCkgSPjDKM/xYG25URArAnAKCN1YwkK/jr3fGSNkU2bdPoHS0aoQCdHH5n YlN9I4ebA3qqgEFDI4eNUao= =mwFb -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?97D5BFC7-D07D-4DB5-A6C2-D4C71C679CA4>
