Date: Mon, 18 Oct 1999 21:50:03 -0700 (PDT) From: Martin Blapp <blapp@attic.ch> To: freebsd-bugs@FreeBSD.org Subject: Re: bin/14406: [SECURITY] strcpy() buffer overflow in umount(8) Message-ID: <199910190450.VAA47171@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR bin/14406; it has been noted by GNATS. From: Martin Blapp <blapp@attic.ch> To: freebsd-gnats-submit@freebsd.org, venglin@lubi.FreeBSD.lublin.pl Cc: Subject: Re: bin/14406: [SECURITY] strcpy() buffer overflow in umount(8) Date: Tue, 19 Oct 1999 04:40:05 +0000 Hi, This is fixed in current since 2 day's. CVSup to the newest sources and try again. And you should not run umount(8) +s anyway :) But we should fix it in releng_3 (and 2.2.8). Thank you very much for your bugreport. Martin To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199910190450.VAA47171>