Date: Fri, 21 Jan 2000 16:08:24 GMT From: TrouBle <trouble@netquick.net> To: Darren Reed <avalon@coombs.anu.edu.au> Cc: oogali@intranova.net (Omachonu Ogali), brett@lariat.org (Brett Glass), security@FreeBSD.ORG Subject: Re: stream.c worst-case kernel paths Message-ID: <20000121.16082400@bastille.netquick.net> In-Reply-To: <200001211415.BAA12772@cairo.anu.edu.au> References: <200001211415.BAA12772@cairo.anu.edu.au>
next in thread | previous in thread | raw e-mail | index | archive | help
So can i get a straight answer, is there yet a patch to fix this=20 problem under current ?? does it affect current ??? and 3.3 and 3.4 ????? if so where can i get it cause i have 5 public=20 boxes, and we gots enemies.... these boxes run 3.2, 3.3 3.4 and 4.0 also is there a way to test the vulnerability is gone after patching=20 ??? guess ill upgrade them all to 3.4 but i need to patch them before=20 some idiot takes em down in a cloud of packets To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000121.16082400>