From owner-freebsd-security Mon Sep 15 19:06:25 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id TAA12896 for security-outgoing; Mon, 15 Sep 1997 19:06:25 -0700 (PDT) Received: from cwsys.cwent.com (0@cschuber.net.gov.bc.ca [142.31.240.113]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id TAA12885 for ; Mon, 15 Sep 1997 19:06:20 -0700 (PDT) Received: (from uucp@localhost) by cwsys.cwent.com (8.8.7/8.6.10) id HAA17279; Mon, 15 Sep 1997 07:45:40 -0700 (PDT) Message-Id: <199709151445.HAA17279@cwsys.cwent.com> Received: from localhost.cwent.com(127.0.0.1), claiming to be "cwsys" via SMTP by localhost.cwent.com, id smtpd017275; Mon Sep 15 14:45:10 1997 Reply-to: cschuber@uumail.gov.bc.ca X-Mailer: MH To: Brian Mitchell cc: tqbf@enteract.com, freebsd-security@freebsd.org Subject: Re: OpenBSD Security Advisory: BSD I/O Signals In-reply-to: Your message of "Mon, 15 Sep 1997 09:04:33 EDT." Date: Mon, 15 Sep 1997 07:45:09 -0700 From: Cy Schubert Sender: owner-freebsd-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > On Mon, 15 Sep 1997 tqbf@rdist.org wrote: > > Didnt linux have almost this exact same problem like 2 years ago? It did, it may have even been about three years ago (about the same time of the syslog() bug). At that time the Linux networking code took a lot of code from Net/2. > > > > --------------------------------------------------------------------------- - > > > > OpenBSD Security Advisory > > > > September 15, 1997 > > > > Vulnerability in I/O Signal Handling Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 UNIX Support OV/VM: BCSC02(CSCHUBER) ITSD BITNET: CSCHUBER@BCSC02.BITNET Government of BC Internet: cschuber@uumail.gov.bc.ca cschuber@bcsc02.gov.bc.ca "Quit spooling around, JES do it."