From owner-freebsd-security Fri Sep 17 13:49:21 1999 Delivered-To: freebsd-security@freebsd.org Received: from rover.village.org (rover.village.org [204.144.255.49]) by hub.freebsd.org (Postfix) with ESMTP id 2E1631540B for ; Fri, 17 Sep 1999 13:49:04 -0700 (PDT) (envelope-from imp@harmony.village.org) Received: from harmony.village.org (harmony.village.org [10.0.0.6]) by rover.village.org (8.9.3/8.9.3) with ESMTP id OAA82867; Fri, 17 Sep 1999 14:48:07 -0600 (MDT) (envelope-from imp@harmony.village.org) Received: from harmony.village.org (localhost.village.org [127.0.0.1]) by harmony.village.org (8.9.3/8.8.3) with ESMTP id OAA05020; Fri, 17 Sep 1999 14:47:05 -0600 (MDT) Message-Id: <199909172047.OAA05020@harmony.village.org> To: Keith Stevenson Subject: Re: CERT amd advisory Cc: freebsd-security@FreeBSD.ORG In-reply-to: Your message of "Fri, 17 Sep 1999 16:12:24 EDT." <19990917161224.A5524@homer.louisville.edu> References: <19990917161224.A5524@homer.louisville.edu> Date: Fri, 17 Sep 1999 14:47:05 -0600 From: Warner Losh Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <19990917161224.A5524@homer.louisville.edu> Keith Stevenson writes: : I seem to recall the 3.3 Release Notes stating that this problem was fixed. They do: 1.2. SECURITY FIXES ------------------- ... amd has been updated to correct a remotely exploitable root hole. ... Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message