Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 Nov 2007 21:23:35 +0100
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        Alexey Dokuchaev <danfe@FreeBSD.org>
Cc:        cvs-src@FreeBSD.org, src-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/contrib/tar/src misc.c src/sys/dev/random yarrow.c
Message-ID:  <20071129202334.GA1160@zaphod.nitro.dk>
In-Reply-To: <20071129180038.GA598@FreeBSD.org>
References:  <200711291608.lATG8s7Q067912@repoman.freebsd.org> <20071129180038.GA598@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 2007.11.29 18:00:38 +0000, Alexey Dokuchaev wrote:
> On Thu, Nov 29, 2007 at 04:08:54PM +0000, Simon L. Nielsen wrote:
> > simon       2007-11-29 16:08:54 UTC
> > 
> >   FreeBSD src repository
> > 
> >   Modified files:        (Branch: RELENG_5)
> >     contrib/tar/src      misc.c 
> >     sys/dev/random       yarrow.c 
> >   Log:
> >   Correct a random value disclosure in random(4). [07:09]
> >   
> >   Correct a gtar directory traversal vulnerability. [07:10]
> >   
> >   Security:       FreeBSD-SA-07:09.random
> >   Security:       FreeBSD-SA-07:10.gtar
> 
> Is 4.x vulnerable?

For gtar, very likely.  For random(4) I don't know - it's likely it
has older random code which isn't affected (at least I seem to recall
it was different)..

> Is it going to be fixed?  I can test patches.  :-)

I and secteam have no plans to fix it, but if someone wants to fix it
in RELENG_4 we don't have any problems with that.

-- 
Simon L. Nielsen



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20071129202334.GA1160>