From owner-freebsd-security Fri Sep 7 9: 9:48 2001 Delivered-To: freebsd-security@freebsd.org Received: from mail.wlcg.com (mail.wlcg.com [198.92.199.5]) by hub.freebsd.org (Postfix) with ESMTP id CA45437B408 for ; Fri, 7 Sep 2001 09:09:45 -0700 (PDT) Received: (from root@localhost) by mail.wlcg.com (8.11.6/8.11.6) id f87G9j280427 for freebsd-security@freebsd.org; Fri, 7 Sep 2001 12:09:45 -0400 (EDT) (envelope-from rsimmons@wlcg.com) Received: from localhost (rsimmons@localhost) by mail.wlcg.com (8.11.6/8.11.6) with ESMTP id f87G9he80418 for ; Fri, 7 Sep 2001 12:09:44 -0400 (EDT) (envelope-from rsimmons@wlcg.com) X-Authentication-Warning: mail.wlcg.com: rsimmons owned process doing -bs Date: Fri, 7 Sep 2001 12:09:39 -0400 (EDT) From: Rob Simmons To: Subject: netbsd vulnerabilities Message-ID: <20010907120248.V78071-100000@mail.wlcg.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Virus-Scanned: by AMaViS perl-10 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Is FreeBSD affected by either of the new vulnerabilities NetBSD just released, 2001-015 and 2001-016? 2001-015 = "Insufficient checking of lengths passed from userland to kernel." 2001-016 = "unsafe chdir usage in fts(3)." Robert Simmons Systems Administrator http://www.wlcg.com/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7mPFHv8Bofna59hYRA7QZAJ9zOoQdhp6IRoQHeOo5EPa2cyzJaQCdGzYD DFIFarA2CNGauwBeFB/yKvo= =62OI -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message