Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Aug 1997 10:29:57 -0400
From:      Omar Thameen <omar@clifford.inch.com>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-97:04.procfs
Message-ID:  <19970828102957.48802@clifford.inch.com>
In-Reply-To: <199708261803.UAA00666@gvr.gvr.org>; from FreeBSD Security Officer on Tue, Aug 26, 1997 at 08:01:00PM %2B0200
References:  <199708261803.UAA00666@gvr.gvr.org>

next in thread | previous in thread | raw e-mail | index | archive | help
What's the official word on whether 2.1.7 is vulnerable?  I know below
says that 2.1.* is, but the previous discussion indicated that it was
not.  I personally haven't gotten the exploit to work, but I may be doing
something wrong.

Omar

On Tue, Aug 26, 1997 at 08:01:00PM +0200, FreeBSD Security Officer wrote:
> 
> 
> =============================================================================
> FreeBSD-SA-97:04                                            Security Advisory
>                                                                 FreeBSD, Inc.
> 
> Topic:          security compromise via procfs
> 
> Category:       core
> Module:         procfs
> Announced:      1997-08-19
> Affects:        FreeBSD 2.1.*, FreeBSD 2.2.*,
> 		FreeBSD-stable and FreeBSD-current 
> 		before 1997/08/12 suffer from this problem.
> Corrected:      FreeBSD-current as of 1997/08/12
> 		FreeBSD-stable as of 1997/08/12
> 		FreeBSD 2.1-stable as of 1997/08/25
> FreeBSD only:   no (also other BSD systems may be affected)
> 
> Patches:        ftp://freebsd.org/pub/CERT/patches/SA-97:04/
> 
> =============================================================================
[...]



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19970828102957.48802>