-----BEGIN PGP SIGNED MESSAGE-----

>>>>> "Romain" == Romain Francoise <[EMAIL PROTECTED]> writes:
    >> for software [3.9,cvs] that has not even been released yet ?

    Romain> All the exploits mention tcpdump 3.8.x as being affected.  I
    Romain> didn't run them to check that it's really the case,
    Romain> though... did you?

  btw, do we have exploit packets in CVS yet?
  (under tests/)

  I'd like to see them as regression test cases... 

- -- 
] Michael Richardson          Xelerance Corporation, Ottawa, ON |  firewalls  [
] mcr @ xelerance.com           Now doing IPsec training, see   |net architect[
] http://www.sandelman.ca/mcr/    www.xelerance.com/training/   |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBQm0o8IqHRg3pndX9AQFvVgP9FqsXx0jNzFByK+M7EemI78IAC7G6d4ha
Z2YmBQrFJY9ye2Z0JAKMlrJYT5smIS3SJPhEhcM8QlbR4NvcU7keWihs9hDmgiRQ
IdtnGh5nNmyW3KV6ix+Uc5/bpWXVFtt1ecf6O6qMvwILBTFxENToO5CvUBZm4ecI
zvFXJDlIF5o=
=Um97
-----END PGP SIGNATURE-----
-
This is the tcpdump-workers list.
Visit https://lists.sandelman.ca/ to unsubscribe.

Reply via email to