Date: Thu, 29 Nov 2007 21:23:35 +0100 From: "Simon L. Nielsen" <simon@FreeBSD.org> To: Alexey Dokuchaev <danfe@FreeBSD.org> Cc: cvs-src@FreeBSD.org, src-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/contrib/tar/src misc.c src/sys/dev/random yarrow.c Message-ID: <20071129202334.GA1160@zaphod.nitro.dk> In-Reply-To: <20071129180038.GA598@FreeBSD.org> References: <200711291608.lATG8s7Q067912@repoman.freebsd.org> <20071129180038.GA598@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 2007.11.29 18:00:38 +0000, Alexey Dokuchaev wrote: > On Thu, Nov 29, 2007 at 04:08:54PM +0000, Simon L. Nielsen wrote: > > simon 2007-11-29 16:08:54 UTC > > > > FreeBSD src repository > > > > Modified files: (Branch: RELENG_5) > > contrib/tar/src misc.c > > sys/dev/random yarrow.c > > Log: > > Correct a random value disclosure in random(4). [07:09] > > > > Correct a gtar directory traversal vulnerability. [07:10] > > > > Security: FreeBSD-SA-07:09.random > > Security: FreeBSD-SA-07:10.gtar > > Is 4.x vulnerable? For gtar, very likely. For random(4) I don't know - it's likely it has older random code which isn't affected (at least I seem to recall it was different).. > Is it going to be fixed? I can test patches. :-) I and secteam have no plans to fix it, but if someone wants to fix it in RELENG_4 we don't have any problems with that. -- Simon L. Nielsen
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20071129202334.GA1160>