Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 28 Jun 1998 10:16:07 +0930
From:      Greg Lehey <grog@lemis.com>
To:        Taavi Talvik <taavi@uninet.ee>, Jordan Hubbard <jkh@FreeBSD.ORG>
Cc:        Jason Godsey <godsey@godsey.net>, isp@FreeBSD.ORG, current@FreeBSD.ORG
Subject:   Re: qpopper compromise (was: !!! FLASH TRAFFIC !!! QPOPPER REMOTE ROOT EXPLOIT (fwd))
Message-ID:  <19980628101607.T23035@freebie.lemis.com>
In-Reply-To: <Pine.BSF.3.95.980628033821.5160A-100000@ns.uninet.ee>; from Taavi Talvik on Sun, Jun 28, 1998 at 03:45:22AM %2B0300
References:  <19980628091010.O23035@freebie.lemis.com> <Pine.BSF.3.95.980628033821.5160A-100000@ns.uninet.ee>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sunday, 28 June 1998 at  3:45:22 +0300, Taavi Talvik wrote:
> On Sun, 28 Jun 1998, Greg Lehey wrote:
>> A fix has been committed to the port.  Download it and rebuild the
>> port if you're interested.
>
> Only thing, popper built with latest patches (incl. patch-ag) dies with
> SIGSEGV on my box immediately when accessed..
>
> This is on current approximately one month old.

Well, at least it doens't compromise the system :-)

I'm copying Jordan on this.  He committed the patch.  You did really
load the port since my message, didn't you?

Greg
--
See complete headers for address and phone numbers
finger grog@lemis.com for PGP public key

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980628101607.T23035>