Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 18 Dec 2000 08:17:49 -0800
From:      Kris Kennaway <kris@FreeBSD.org>
To:        security@FreeBSD.org
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-00:77.procfs
Message-ID:  <20001218081749.A29592@citusc.usc.edu>
In-Reply-To: <20001218153619.071BE37B400@hub.freebsd.org>; from security-advisories@FreeBSD.ORG on Mon, Dec 18, 2000 at 07:36:19AM -0800
References:  <20001218153619.071BE37B400@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--PNTmBPCT7hxwcZjr
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Oops, apparently the /proc/<pid>/ctl local root exploit applies to 3.x
as well and has not yet been fixed. I'm told the patch for 4.2 listed
in the advisory applies cleanly but has not been tested.

Kris

--PNTmBPCT7hxwcZjr
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6PjitWry0BWjoQKURAorXAKCKYpvR+6rLqr0fcejjtRAQn36OmACg9L1y
NBoPXDSXYNcGp+B7C5wfLfM=
=KjIH
-----END PGP SIGNATURE-----

--PNTmBPCT7hxwcZjr--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001218081749.A29592>