From owner-freebsd-security Thu Dec 14 12: 8:12 2000 From owner-freebsd-security@FreeBSD.ORG Thu Dec 14 12:08:10 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from s2-c2.cnmnetwork.com (s2-c2.cnmnetwork.com [209.163.64.72]) by hub.freebsd.org (Postfix) with SMTP id 2EA6337B400 for ; Thu, 14 Dec 2000 12:08:10 -0800 (PST) Received: (qmail 21467 invoked from network); 14 Dec 2000 12:06:44 -0800 Received: from prometheus.cnmnetwork.com (HELO compton) (irc@209.79.28.5) by s2-c2.cnmnetwork.com with SMTP; 14 Dec 2000 12:06:44 -0800 Date: Thu, 14 Dec 2000 12:21:06 -0800 (PST) From: jrz Reply-To: jrz Subject: Re: procfs vulnerability (Re: Details of www.freebsd.org penetration) To: security@FreeBSD.org MIME-Version: 1.0 Content-Type: TEXT/plain; charset=us-ascii Content-MD5: Q6wHG/XziiQ7dh5fuW6rkA== X-Mailer: dtmail 1.3.0 @(#)CDE Version 1.4 SunOS 5.8 i86pc i386 Message-Id: <20001214200810.2EA6337B400@hub.freebsd.org> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >unmount procfs now on >your multi-user systems. > >Kris Kris, What versions of FreeBSD is this affecting at this time? -jrz --- Jacob Zehnder | Systems Engineer CNM Network | http://www.cnmnetwork.com business: jrz@cnmnetwork.com other: jrz@rackmount.org --- "Where am I, and what am I doing in this handbasket?" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message