Date: Mon, 27 Apr 2015 10:34:38 +0200 From: Piotr Kubaj <pkubaj@riseup.net> To: freebsd-security@freebsd.org Cc: venture37@gmail.com Subject: Re: base/release/10.1.0/contrib/file vulnerabilities? Message-ID: <553DF49E.3020502@riseup.net>
next in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --uECupdQeNGdn6f8JjMXk6Ij8CXu3lj6TW Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hi, I wrote about this vulnerability in January: https://lists.freebsd.org/pipermail/freebsd-security/2015-January/008115.= html There were only patches for stable. --uECupdQeNGdn6f8JjMXk6Ij8CXu3lj6TW Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVPfSfAAoJEC9nKukRsfY+GZkP/34pt/mJ1rpsUNUmCFzVGszV Y6bPWUZdv6x7YkJc4OBT2V9dfnOEmKlDZ1swqMRqc+MgDGFOumcHMM328Hq18Ism zljAfX5ugDpPsU1iiHnmCOKiNTN3r4YFCAtl76dLZ8UaxA/5T/ulDFbiyZJuuCbk Y08TjfFt5g3YayVRg6hN0Yo9tXXB5Y/D57ql0cLPcw2B6UsrCsvwzb9JEMRRu2S/ 0t6A4SfJmtQcJeRNl7cEsq56bqqc3UOFt0Bzng4xkYhMwWldjHRdAd+nvoaPyqKt PEOr92vQIxNKBZl8Ncz/jCPNkgXdlaLqOew9975qNbi1DfBczK8593M8p1cQ2hwu vT14W+ihYxV7EiFI2x3QnYeOAOy2Djx2h44h/kLHVTcdC+O93Jvl7U3Z1IduOvC7 dgxGI/Wv0IRzCuaM7abNZMc7XH0o2nrm8xMWvgpLPDchBGkNQmqjynmufo1vVyCv cZPdHuHWHX7Uyl9x2wyYbrsD74aG+C3hUO1uHR2af35Y1qYNlpzkll5VKqqQQBKH qpe9qsw8ie4Yy4bLcQLnbaCf+Po5IOBQgcBdz73tS13ttdXFBtCgoJ4fcZlOxcLR X0xlZLS1svTdR/kNoknDiDtzM7mmQIiciFepog1hd03wFmuOdFGpzbVFqpEJw5m1 ImHRWoEDJzW/cPxkGVCN =UPYg -----END PGP SIGNATURE----- --uECupdQeNGdn6f8JjMXk6Ij8CXu3lj6TW--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?553DF49E.3020502>