Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Sep 2001 13:48:11 -0400 (EDT)
From:      project10 <project10@alpha.focalnetworks.net>
To:        Rob Simmons <rsimmons@wlcg.com>
Cc:        <freebsd-security@freebsd.org>
Subject:   Re: netbsd vulnerabilities
Message-ID:  <20010907134719.S92125-100000@alpha.focalnetworks.net>
In-Reply-To: <20010907120248.V78071-100000@mail.wlcg.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Rob,

I believe the fts(3) issue was resolved in an earlier issue -- I remeber
applying the patch for it. It may, however, have been an unrelated issue.
I guess we'll just have to wait and see.

-Shawn

On Fri, 7 Sep 2001, Rob Simmons wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: RIPEMD160
>
> Is FreeBSD affected by either of the new vulnerabilities NetBSD just
> released, 2001-015 and 2001-016?
>
> 2001-015 = "Insufficient checking of lengths passed from userland to
> kernel."
>
> 2001-016 = "unsafe chdir usage in fts(3)."
>
> Robert Simmons
> Systems Administrator
> http://www.wlcg.com/
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.6 (FreeBSD)
> Comment: For info see http://www.gnupg.org
>
> iD8DBQE7mPFHv8Bofna59hYRA7QZAJ9zOoQdhp6IRoQHeOo5EPa2cyzJaQCdGzYD
> DFIFarA2CNGauwBeFB/yKvo=
> =62OI
> -----END PGP SIGNATURE-----
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010907134719.S92125-100000>