From owner-freebsd-security Tue Jan 25 20:39: 2 2000 Delivered-To: freebsd-security@freebsd.org Received: from crack.x509.com (crack.x509.com [199.175.150.1]) by hub.freebsd.org (Postfix) with ESMTP id DA29A15070; Tue, 25 Jan 2000 20:38:14 -0800 (PST) (envelope-from oswell@xcert.com) Received: from oswell.x509.com (oswell.x509.com [199.175.148.212]) by crack.x509.com (8.9.3/XCERT) with ESMTP id UAA03125; Tue, 25 Jan 2000 20:37:31 -0800 (PST) Date: Tue, 25 Jan 2000 20:37:31 -0800 (PST) From: Michael Oswell X-Sender: oswell@oswell.x509.com To: Kris Kennaway Cc: freebsd-security@FreeBSD.ORG Subject: Re: make -j vulnerability && FreeBSD 2.2.x In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Tue, 25 Jan 2000, Kris Kennaway wrote: > Hmm, the patch which was applied to 2.2-STABLE seemed to compile & work > when I tested it - it applied cleanly with some fuzz. What problems did > you have? My mistake if one was already released.. I never noticed it. :) I used the one that was at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:01 which unless I am mistaken, is for 3.x. If one was available for the 2.2-STABLE tree, I never saw it, so manually patched make using the 3.x patch. ----- Michael Oswell Xcert International Inc. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message