Date: Fri, 10 Mar 2000 00:07:51 -0700 From: Warner Losh <imp@village.org> To: Kris Kennaway <kris@hub.freebsd.org> Cc: security@FreeBSD.ORG Subject: Re: dump buffer overflow (fwd) Message-ID: <200003100707.AAA14345@harmony.village.org> In-Reply-To: Your message of "Wed, 08 Mar 2000 14:42:54 PST." <Pine.BSF.4.21.0003081441110.1655-100000@hub.freebsd.org> References: <Pine.BSF.4.21.0003081441110.1655-100000@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSF.4.21.0003081441110.1655-100000@hub.freebsd.org> Kris Kennaway writes: : If anyone was wondering about this, Warner fixed it more than 3 months ago : after the hole was found by the freebsd auditing project, and so 3.4-REL : is not vulnerable. It would be nice for people at least to state which : version they tested when making blanket claims of insecurity :-( He didn't reply to me when I sent mail to him. In fact, I think this is where they found out about it. We fixed it, people noticed. They looked at Linux, found the problem, yelled it to the world. Someone pulled in an old version of FreeBSD and thought FreeBSD was vulnerable.... Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200003100707.AAA14345>