From owner-freebsd-stable Sat Apr 7 0: 8:15 2001 Delivered-To: freebsd-stable@freebsd.org Received: from www.golsyd.net.au (golsyd.net.au [203.57.20.1]) by hub.freebsd.org (Postfix) with ESMTP id E605737B422 for ; Sat, 7 Apr 2001 00:08:12 -0700 (PDT) (envelope-from kaltorak@quake.com.au) Received: from [203.164.12.28] by www.quake.com.au (NTMail 4.30.0012/AB6169.63.5724aadf) with ESMTP id yavaaaaa for ; Sat, 7 Apr 2001 17:08:22 +1000 Message-ID: <3ACEBDB0.DD6555C8@quake.com.au> Date: Sat, 07 Apr 2001 17:11:44 +1000 From: Kal Torak X-Mailer: Mozilla 4.73 [en] (Win98; U) X-Accept-Language: en MIME-Version: 1.0 To: FreeBSD-stable Subject: ntpd root exploit - advisory? Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Just wondering why there has been no security advisory on the announce list about the ntpd root exploit and buffer overflow allowing for syslog DoS attack... I noticed that a few fixes have been committed to stable for ntpd, but no advisory... Whats going on? Is it still not totally fixed yet? Thanks! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message