From owner-freebsd-stable Tue Mar 12 12:28:15 2002 Delivered-To: freebsd-stable@freebsd.org Received: from mass.dis.org (dhcp45-21.dis.org [216.240.45.21]) by hub.freebsd.org (Postfix) with ESMTP id 1764737B405 for ; Tue, 12 Mar 2002 12:28:05 -0800 (PST) Received: from mass.dis.org (localhost [127.0.0.1]) by mass.dis.org (8.11.6/8.11.6) with ESMTP id g2CKR9t02504; Tue, 12 Mar 2002 12:27:09 -0800 (PST) (envelope-from msmith@mass.dis.org) Message-Id: <200203122027.g2CKR9t02504@mass.dis.org> X-Mailer: exmh version 2.5 07/13/2001 with nmh-1.0.4 To: Brooks Davis Cc: Alan Eldridge , FreeBSD Stable List Subject: Re: zlib security advisory In-reply-to: Your message of "Mon, 11 Mar 2002 16:26:02 PST." <20020311162602.A28470@Odin.AC.HMC.Edu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Tue, 12 Mar 2002 12:27:09 -0800 From: Michael Smith Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG > On Mon, Mar 11, 2002 at 06:59:24PM -0500, Alan Eldridge wrote: > > FWIW RH notes several things that either have their own copy of zlib > > that needs to be patched or that statically link and so need to be rebuil= > t. > >=20 > > Has anyone produced such a list for FBSD, or is it not applicable to us? > > FreeBSD is not effected. The only ports that are effected are ones that > are run under linux emulation. This is not entirely true; the exploit can be used as a DoS or disk-filling service against a FreeBSD system (either by causing the application to abort or generate profuse output). -- To announce that there must be no criticism of the president, or that we are to stand by the president, right or wrong, is not only unpatriotic and servile, but is morally treasonable to the American public. - Theodore Roosevelt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message