Date: Wed, 29 Jun 2005 17:01:07 -0400 From: Richard Coleman <rcoleman@criticalmagic.com> To: Uwe Doering <gemini@geminix.org> Cc: freebsd-security@freebsd.org Subject: Re: Any status on timestamp vulnerability fix for 4.X? Message-ID: <42C30C13.8090302@criticalmagic.com> In-Reply-To: <42BD3AB4.2030209@geminix.org> References: <42BC5054.908@criticalmagic.com> <42BD3AB4.2030209@geminix.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Uwe Doering wrote: > Richard Coleman wrote: > >> Any information on when (or if) the following timestamp vulnerability >> will be fixed for 4.X? Any information would be appreciated. >> >> http://www.kb.cert.org/vuls/id/637934 > > > FYI, the fix for RELENG_5 applies to RELENG_4 as is (apart from the CVS > version header, of course): > > http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/tcp_input.c.diff?r1=1.252.2.15&r2=1.252.2.16&f=u > > > After verifying its semantic correctness for RELENG_4 we've been running > the patch for a couple of weeks now with no ill effects. > > I'm posting this also as an encouragement for committers to go ahead and > do the MFC. It's low hanging fruit. > > Uwe We tried applying that diff to 4.10, but compilation failed with tcp_input.o: In function 'tcp_dooptions': tcp_input.o(.text+0x21d8): undefined reference to 'TSTMP_GT' Did you just define that macro? Or was something else required? Thanks for the help. Richard Coleman rcoleman@criticalmagic.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?42C30C13.8090302>