[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

RE: "teardrop" attacks



I totally agree on that. This would also give us a F0 0F safe kernel in
the stable release.

Michael

--
Dr. Michael Meskes, Project-Manager    | topsystem Systemhaus GmbH
meskes@topsystem.de                    | Europark A2, Adenauerstr. 20
meskes@debian.org                      | 52146 Wuerselen
Go SF49ers! Go Rhein Fire!             | Tel: (+49) 2405/4670-44
Use Debian GNU/Linux!                  | Fax: (+49) 2405/4670-10

> -----Original Message-----
> From:	Paul J Thompson [SMTP:paul@thomppj.student.okstate.edu]
> Sent:	Tuesday, November 18, 1997 8:42 PM
> To:	Mark W. Eichin
> Subject:	Re: "teardrop" attacks
> 
> Better yet, just release a 2.0.32 kernel source and kernel-image (and
> kernel headers?) into bo-updates (and, of course, hamm).
> 


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-devel-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .


Reply to: