-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "Romain" == Romain Francoise <[EMAIL PROTECTED]> writes: >> for software [3.9,cvs] that has not even been released yet ? Romain> All the exploits mention tcpdump 3.8.x as being affected. I Romain> didn't run them to check that it's really the case, Romain> though... did you? btw, do we have exploit packets in CVS yet? (under tests/) I'd like to see them as regression test cases... - -- ] Michael Richardson Xelerance Corporation, Ottawa, ON | firewalls [ ] mcr @ xelerance.com Now doing IPsec training, see |net architect[ ] http://www.sandelman.ca/mcr/ www.xelerance.com/training/ |device driver[ ] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) Comment: Finger me for keys iQCVAwUBQm0o8IqHRg3pndX9AQFvVgP9FqsXx0jNzFByK+M7EemI78IAC7G6d4ha Z2YmBQrFJY9ye2Z0JAKMlrJYT5smIS3SJPhEhcM8QlbR4NvcU7keWihs9hDmgiRQ IdtnGh5nNmyW3KV6ix+Uc5/bpWXVFtt1ecf6O6qMvwILBTFxENToO5CvUBZm4ecI zvFXJDlIF5o= =Um97 -----END PGP SIGNATURE----- - This is the tcpdump-workers list. Visit https://lists.sandelman.ca/ to unsubscribe.