| Summary: | [SECURITY] strcpy() buffer overflow in umount(8) | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Base System | Reporter: | venglin <venglin> | ||||
| Component: | bin | Assignee: | freebsd-bugs (Nobody) <bugs> | ||||
| Status: | Closed FIXED | ||||||
| Severity: | Affects Only Me | ||||||
| Priority: | Normal | ||||||
| Version: | 3.2-STABLE | ||||||
| Hardware: | Any | ||||||
| OS: | Any | ||||||
| Attachments: |
|
||||||
|
Description
venglin
1999-10-18 19:50:00 UTC
Hi, This is fixed in current since 2 day's. CVSup to the newest sources and try again. And you should not run umount(8) +s anyway :) But we should fix it in releng_3 (and 2.2.8). Thank you very much for your bugreport. Martin State Changed From-To: open->closed This has been fixed in -CURRENT and 3.3/3.4. brooks 2010-02-18 20:29:51 UTC
FreeBSD ports repository
Modified files:
www/ftasv Makefile
Log:
This port works fine with Apache 2.0 so adjust USE_APACHE accordingly.
Approved by: sylvio (maintainer)
Feature safe: yes
PR: ports/14406
Revision Changes Path
1.3 +1 -1 ports/www/ftasv/Makefile
_______________________________________________
cvs-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
|