lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 10 Sep 2003 19:02:11 +0200
From: Jedi/Sector One <j@....org>
To: Jason Houx <coldiso@...x.org>
Cc: bugtraq@...urityfocus.com
Subject: Re: Integer overflow in OpenBSD kernel


On Wed, Sep 10, 2003 at 11:07:49AM -0400, Jason Houx wrote:
> Question - how is upgrade to current a fix for this.   Did you research 
> 3.3 --stable et al ?

  The fix has been committed to -STABLE branch.
  
  You don't need to upgrade to -current, moreover this is not a trivial
operation since the format of executables files changed on x86 since 3.3.
  
  Just keep your current 3.3 version, sync your CVS tree with the OPENBSD_3_3
tag, recompile your kernel and reboot.

  If you're not familiar with the process of following the -STABLE branch,
please have a look at :

  http://www.openbsd.org/stable.html
  http://www.uk.openbsd.org/anoncvs.html
  http://www.openbsd.org/cvsup.html
  
  Best regards,
-- 
 __  /*-      Frank DENIS (Jedi/Sector One) <j@...Networks.Com>     -*\  __
 \ '/    <a href="http://www.PureFTPd.Org/"> Secure FTP Server </a>    \' /
  \/  <a href="http://www.Jedi.Claranet.Fr/"> Misc. free software </a>  \/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ