lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3DCCEFD7.28013.2EC9D9@localhost>
From: dendler at idefense.com (David Endler)
Subject: iDEFENSE Security Advisory 11.08.02b: Non-Explicit Path Vulnerability in QNX Neutrino RTOS

Thanks for pointing out the typo, the date should have read 
January, 2003. The advisory has been updated on the web site.

-dave

> -----Original Message-----
> From: Erik Parker [mailto:eparker@...dsec.com]
> Sent: Saturday, November 09, 2002 5:32 AM
> To: David Endler
> Cc: full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] iDEFENSE Security Advisory 
11.08.02b:
> Non-Explicit Path Vulnerability in QNX Neutrino RTOS
> 
> 
> > VI. VENDOR FIX
> >
> > QNX Neutrino RTOS 6.2.1, which is slated to be released in 
January
> > 2002, should fix this vulnerability. According to QNX, 
concerned
> > customers can contact their sales rep for an advance copy.
> 
> Damn, I need a dev team that can create patches 11 months in 
> the past.. That's
> what I call being on top of their game.
> 
> You're pathetic David.
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ