From owner-freebsd-bugs Mon Oct 18 21:50: 9 1999 Delivered-To: freebsd-bugs@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id 4A97615D6F for ; Mon, 18 Oct 1999 21:50:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id VAA47171; Mon, 18 Oct 1999 21:50:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Date: Mon, 18 Oct 1999 21:50:03 -0700 (PDT) Message-Id: <199910190450.VAA47171@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org Cc: From: Martin Blapp Subject: Re: bin/14406: [SECURITY] strcpy() buffer overflow in umount(8) Reply-To: Martin Blapp Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/14406; it has been noted by GNATS. From: Martin Blapp To: freebsd-gnats-submit@freebsd.org, venglin@lubi.FreeBSD.lublin.pl Cc: Subject: Re: bin/14406: [SECURITY] strcpy() buffer overflow in umount(8) Date: Tue, 19 Oct 1999 04:40:05 +0000 Hi, This is fixed in current since 2 day's. CVSup to the newest sources and try again. And you should not run umount(8) +s anyway :) But we should fix it in releng_3 (and 2.2.8). Thank you very much for your bugreport. Martin To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message