Date: Fri, 7 Sep 2001 13:48:11 -0400 (EDT) From: project10 <project10@alpha.focalnetworks.net> To: Rob Simmons <rsimmons@wlcg.com> Cc: <freebsd-security@freebsd.org> Subject: Re: netbsd vulnerabilities Message-ID: <20010907134719.S92125-100000@alpha.focalnetworks.net> In-Reply-To: <20010907120248.V78071-100000@mail.wlcg.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Rob, I believe the fts(3) issue was resolved in an earlier issue -- I remeber applying the patch for it. It may, however, have been an unrelated issue. I guess we'll just have to wait and see. -Shawn On Fri, 7 Sep 2001, Rob Simmons wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: RIPEMD160 > > Is FreeBSD affected by either of the new vulnerabilities NetBSD just > released, 2001-015 and 2001-016? > > 2001-015 = "Insufficient checking of lengths passed from userland to > kernel." > > 2001-016 = "unsafe chdir usage in fts(3)." > > Robert Simmons > Systems Administrator > http://www.wlcg.com/ > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (FreeBSD) > Comment: For info see http://www.gnupg.org > > iD8DBQE7mPFHv8Bofna59hYRA7QZAJ9zOoQdhp6IRoQHeOo5EPa2cyzJaQCdGzYD > DFIFarA2CNGauwBeFB/yKvo= > =62OI > -----END PGP SIGNATURE----- > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010907134719.S92125-100000>