From owner-freebsd-bugs Tue Oct 31 16:21:34 2000 Delivered-To: freebsd-bugs@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 1EF6D37B4CF; Tue, 31 Oct 2000 16:21:33 -0800 (PST) Received: (from brian@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id QAA69499; Tue, 31 Oct 2000 16:21:33 -0800 (PST) (envelope-from brian@FreeBSD.org) Date: Tue, 31 Oct 2000 16:21:33 -0800 (PST) From: Message-Id: <200011010021.QAA69499@freefall.freebsd.org> To: venglin@freebsd.lublin.pl, brian@FreeBSD.org, freebsd-bugs@FreeBSD.org Subject: Re: bin/22319: Malicious remote user can cause ppp(8) to segfault Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: Malicious remote user can cause ppp(8) to segfault State-Changed-From-To: open->closed State-Changed-By: brian State-Changed-When: Tue Oct 31 16:19:38 PST 2000 State-Changed-Why: I've just merged a fix for this (making fd_sets dynamic). Note: there are still DOS attacks possible in this respect. There's no substitute for a well-configured firewall. http://www.freebsd.org/cgi/query-pr.cgi?pr=22319 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message