Skip site navigation (1)Skip section navigation (2)
Date:      29 Jun 1998 08:58:02 +0200
From:      Thomas Gellekum <tg@ihf.rwth-aachen.de>
To:        Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: xlock
Message-ID:  <87btrcy9s5.fsf@ghpc6.ihf.rwth-aachen.de>
In-Reply-To: Christoph Kukulies's message of "Mon, 29 Jun 1998 08:32:34 %2B0200 (MEST)"
References:  <199806290632.IAA00836@gilberto.physik.RWTH-Aachen.DE>

next in thread | previous in thread | raw e-mail | index | archive | help
Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE> writes:

> Alarmed by recent buffer overflow attacks on Linux machines in
> my vicinity (an exploit for this is available) I thought about
> xlock under FreeBSD and would like to know whether the
> security hole has been sorted out under FreeBSD 2.2.x or what
> measures are advised to prevent it.

Could you tell more about this?

tg

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87btrcy9s5.fsf>