From owner-freebsd-security Sun Jan 23 17:37: 7 2000 Delivered-To: freebsd-security@freebsd.org Received: from vinyl.sentex.ca (vinyl.sentex.ca [209.112.4.14]) by hub.freebsd.org (Postfix) with ESMTP id C758615046 for ; Sun, 23 Jan 2000 17:37:02 -0800 (PST) (envelope-from mike@sentex.net) Received: from granite.sentex.net (granite-atm.sentex.ca [209.112.4.1]) by vinyl.sentex.ca (8.9.3/8.9.3) with ESMTP id UAA04581 for ; Sun, 23 Jan 2000 20:37:01 -0500 (EST) (envelope-from mike@sentex.net) Received: from p10 (ospf-mdt.sentex.net [205.211.164.81]) by granite.sentex.net (8.8.8/8.6.9) with ESMTP id UAA20854 for ; Sun, 23 Jan 2000 20:37:01 -0500 (EST) Message-Id: <4.2.2.20000123203515.00a506c0@mail.sentex.net> X-Sender: mdtancsa@mail.sentex.net X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 Date: Sun, 23 Jan 2000 20:35:45 -0500 To: freebsd-security@FreeBSD.ORG From: Mike Tancsa Subject: Re: Fwd: *BSD procfs vulnerability In-Reply-To: <4.2.0.58.20000123181240.0144ef10@students.uiuc.edu> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org What are the implications on unmounting procfs ? ---Mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message