Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 16:08:24 GMT
From:      TrouBle <trouble@netquick.net>
To:        Darren Reed <avalon@coombs.anu.edu.au>
Cc:        oogali@intranova.net (Omachonu Ogali), brett@lariat.org (Brett Glass), security@FreeBSD.ORG
Subject:   Re: stream.c worst-case kernel paths
Message-ID:  <20000121.16082400@bastille.netquick.net>
In-Reply-To: <200001211415.BAA12772@cairo.anu.edu.au>
References:  <200001211415.BAA12772@cairo.anu.edu.au>

next in thread | previous in thread | raw e-mail | index | archive | help

So can i get a straight answer, is there yet a patch to fix this=20
problem under current ?? does it affect current ???

and 3.3 and 3.4 ????? if so where can i get it cause i have 5 public=20
boxes, and we gots enemies.... these boxes run 3.2, 3.3 3.4 and 4.0

also is there a way to test the vulnerability is gone after patching=20
??? guess ill upgrade them all to 3.4 but i need to patch them before=20
some idiot takes em down in a cloud of packets





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000121.16082400>