Date: Sun, 28 Jun 1998 10:16:07 +0930 From: Greg Lehey <grog@lemis.com> To: Taavi Talvik <taavi@uninet.ee>, Jordan Hubbard <jkh@FreeBSD.ORG> Cc: Jason Godsey <godsey@godsey.net>, isp@FreeBSD.ORG, current@FreeBSD.ORG Subject: Re: qpopper compromise (was: !!! FLASH TRAFFIC !!! QPOPPER REMOTE ROOT EXPLOIT (fwd)) Message-ID: <19980628101607.T23035@freebie.lemis.com> In-Reply-To: <Pine.BSF.3.95.980628033821.5160A-100000@ns.uninet.ee>; from Taavi Talvik on Sun, Jun 28, 1998 at 03:45:22AM %2B0300 References: <19980628091010.O23035@freebie.lemis.com> <Pine.BSF.3.95.980628033821.5160A-100000@ns.uninet.ee>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sunday, 28 June 1998 at 3:45:22 +0300, Taavi Talvik wrote: > On Sun, 28 Jun 1998, Greg Lehey wrote: >> A fix has been committed to the port. Download it and rebuild the >> port if you're interested. > > Only thing, popper built with latest patches (incl. patch-ag) dies with > SIGSEGV on my box immediately when accessed.. > > This is on current approximately one month old. Well, at least it doens't compromise the system :-) I'm copying Jordan on this. He committed the patch. You did really load the port since my message, didn't you? Greg -- See complete headers for address and phone numbers finger grog@lemis.com for PGP public key To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980628101607.T23035>