From owner-freebsd-security Thu Dec 14 13: 7:31 2000 From owner-freebsd-security@FreeBSD.ORG Thu Dec 14 13:07:28 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from earth.wnm.net (earth.wnm.net [208.246.240.243]) by hub.freebsd.org (Postfix) with ESMTP id 36E9237B402 for ; Thu, 14 Dec 2000 13:07:28 -0800 (PST) Received: from localhost (alex@localhost) by earth.wnm.net (8.11.0/8.11.0) with ESMTP id eBEL8GP59074; Thu, 14 Dec 2000 15:08:16 -0600 (CST) Date: Thu, 14 Dec 2000 15:08:16 -0600 (CST) From: Alex Charalabidis To: jrz Cc: security@FreeBSD.ORG Subject: Re: procfs vulnerability (Re: Details of www.freebsd.org penetration) In-Reply-To: <20001214200810.2EA6337B400@hub.freebsd.org> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 14 Dec 2000, jrz wrote: > >unmount procfs now on > >your multi-user systems. > > > >Kris > > Kris, > > What versions of FreeBSD is this affecting at this time? > Jake, I'm going by the assumption that this is at least 4.x and probably 3.x too. That's what we expect the advisory to tell us, let him get the data together. We don't want him making any hasty announcements here under pressure and then posting something else in the advisory. -ac -- ============================================================== Alex Charalabidis (AC8139) 5050 Poplar Ave, Ste 170 System Administrator Memphis, TN 38157 WebNet Memphis (901) 432 6000 Author, The Book of IRC http://www.bookofirc.com/ ============================================================== To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message