Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 Mar 2000 00:07:51 -0700
From:      Warner Losh <imp@village.org>
To:        Kris Kennaway <kris@hub.freebsd.org>
Cc:        security@FreeBSD.ORG
Subject:   Re: dump buffer overflow (fwd) 
Message-ID:  <200003100707.AAA14345@harmony.village.org>
In-Reply-To: Your message of "Wed, 08 Mar 2000 14:42:54 PST." <Pine.BSF.4.21.0003081441110.1655-100000@hub.freebsd.org> 
References:  <Pine.BSF.4.21.0003081441110.1655-100000@hub.freebsd.org>  

next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSF.4.21.0003081441110.1655-100000@hub.freebsd.org> Kris Kennaway writes:
: If anyone was wondering about this, Warner fixed it more than 3 months ago
: after the hole was found by the freebsd auditing project, and so 3.4-REL
: is not vulnerable. It would be nice for people at least to state which
: version they tested when making blanket claims of insecurity :-(

He didn't reply to me when I sent mail to him.

In fact, I think this is where they found out about it.  We fixed it,
people noticed.  They looked at Linux, found the problem, yelled it to 
the world.  Someone pulled in an old version of FreeBSD and thought
FreeBSD was vulnerable....

Warner


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200003100707.AAA14345>