Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 7 Nov 2000 04:20:37 -0500 (EST)
From:      Trevor Johnson <trevor@jpj.net>
To:        Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: ncurses buffer overflows (fwd)
Message-ID:  <Pine.BSI.4.21.0011070418210.17172-100000@blues.jpj.net>
In-Reply-To: <Pine.BSI.4.21.0011070358150.17172-100000@blues.jpj.net>

next in thread | previous in thread | raw e-mail | index | archive | help
A few minutes ago, I wrote:

> The older libcurses present in FreeBSD 2.x
> and 3.x has not been sufficiently tested for the vulnerabilities discussed in
> this advisory.  However, according to a report by Valentin Nechayev, FreeBSD
> 3.5-STABLE does not exhibit them.

Now I notice http://www.securityfocus.com/templates/advisory.html?id=2269
which says that ncurses 1.8.6 in FreeBSD 3.4 has a problem which sounds
like the same one.
-- 
Trevor Johnson
http://jpj.net/~trevor/gpgkey.txt



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.4.21.0011070418210.17172-100000>