Summary: | sys-freebsd/freebsd-sources < 6.2-r4 sendfile(2) write-only file permission bypass (CVE-2008-0777) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | bsd+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://security.freebsd.org/advisories/FreeBSD-SA-08:03.sendfile.asc | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() BSD herd, please act. This is the third security bug that is now open, and the others are not moving at all. Are you maintaining the Gentoo BSD port, or can/should this be p.masked? (In reply to comment #1) > BSD herd, please act. > > This is the third security bug that is now open, and the others are not moving > at all. Are you maintaining the Gentoo BSD port, or can/should this be > p.masked? > *ping* 6.2-r4 has the patch thanks, closing. |