Date: Thu, 26 Jul 2001 14:52:58 -0700 From: Kris Kennaway <kris@obsecurity.org> To: jianzhong ren <jian@linuxmail.org> Cc: FreeBSD Security <freebsd-security@FreeBSD.ORG> Subject: Re: some new exploit is out Message-ID: <20010726145258.A78877@xor.obsecurity.org> In-Reply-To: <20010726214641.18021.qmail@linuxmail.org>; from jian@linuxmail.org on Fri, Jul 27, 2001 at 05:46:41AM %2B0800 References: <20010726214641.18021.qmail@linuxmail.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--J/dobhs11T7y2rNN Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Fri, Jul 27, 2001 at 05:46:41AM +0800, jianzhong ren wrote: > i know that pacth for telnet is out too, but is there any new patch > for shared signals vulnerability Yes, a while ago. You do read advisories, right? > adn portbinding shellcode? What's this one? Kris --J/dobhs11T7y2rNN Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7YJE6Wry0BWjoQKURAq+7AKD6k9aL7gwAHxw2strKpu0M4VgTAwCfbT5U MtLBMhsA+tUjkacMxTtk5Kk= =apZe -----END PGP SIGNATURE----- --J/dobhs11T7y2rNN-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010726145258.A78877>