Date: Mon, 18 Dec 2000 08:17:49 -0800 From: Kris Kennaway <kris@FreeBSD.org> To: security@FreeBSD.org Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:77.procfs Message-ID: <20001218081749.A29592@citusc.usc.edu> In-Reply-To: <20001218153619.071BE37B400@hub.freebsd.org>; from security-advisories@FreeBSD.ORG on Mon, Dec 18, 2000 at 07:36:19AM -0800 References: <20001218153619.071BE37B400@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--PNTmBPCT7hxwcZjr Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Oops, apparently the /proc/<pid>/ctl local root exploit applies to 3.x as well and has not yet been fixed. I'm told the patch for 4.2 listed in the advisory applies cleanly but has not been tested. Kris --PNTmBPCT7hxwcZjr Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6PjitWry0BWjoQKURAorXAKCKYpvR+6rLqr0fcejjtRAQn36OmACg9L1y NBoPXDSXYNcGp+B7C5wfLfM= =KjIH -----END PGP SIGNATURE----- --PNTmBPCT7hxwcZjr-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001218081749.A29592>