lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20091201014059.GA48267@fast.rit.edu> Date: Mon, 30 Nov 2009 20:40:59 -0500 From: Ryan Steinmetz <rpsfa@....edu> To: Benji <me@...ji.com> Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, Kingcope <kcope2@...glemail.com> Subject: Re: ** FreeBSD local r00t zeroday 6.4-RELEASE not vuln On (11/30/09 22:51), Benji wrote: > 7.0 not vuln. > > On Mon, Nov 30, 2009 at 10:49 PM, Ed Carp <erc@...ox.com> wrote: > > > On 11/30/09, Kingcope <kcope2@...glemail.com> wrote: > > > > > Systems tested/affected > > > ********************************** > > > FreeBSD 8.0-RELEASE *** VULNERABLE > > > FreeBSD 7.1-RELEASE *** VULNERABLE > > > FreeBSD 6.3-RELEASE *** NOT VULN > > > FreeBSD 4.9-RELEASE *** NOT VULN > > > > Glad I still run 6.3! How about 6.4? > > > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ -- Ryan Steinmetz Lead Security/Systems Administrator Infrastructure Engineering Rochester Institute of Technology 585.475.5663 PGP: EF36 D45A 5CA9 28B1 A550 18CD A43C D111 7AD7 FAF2 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists