From owner-freebsd-bugs@FreeBSD.ORG Thu Jan 2 21:41:36 2014 Return-Path: Delivered-To: freebsd-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 800992C5; Thu, 2 Jan 2014 21:41:36 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 54FA01641; Thu, 2 Jan 2014 21:41:36 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id s02LfaVD081243; Thu, 2 Jan 2014 21:41:36 GMT (envelope-from jilles@freefall.freebsd.org) Received: (from jilles@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id s02Lfab5081242; Thu, 2 Jan 2014 21:41:36 GMT (envelope-from jilles) Date: Thu, 2 Jan 2014 21:41:36 GMT Message-Id: <201401022141.s02Lfab5081242@freefall.freebsd.org> To: jilles@FreeBSD.org, freebsd-bugs@FreeBSD.org, jilles@FreeBSD.org From: jilles@FreeBSD.org Subject: Re: bin/185393: find(1): -lname buffer read overflow bug X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Jan 2014 21:41:36 -0000 Old Synopsis: find -lname buffer read overflow bug New Synopsis: find(1): -lname buffer read overflow bug Responsible-Changed-From-To: freebsd-bugs->jilles Responsible-Changed-By: jilles Responsible-Changed-When: Thu Jan 2 21:41:09 UTC 2014 Responsible-Changed-Why: I'm working on this. http://www.freebsd.org/cgi/query-pr.cgi?pr=185393