Date: Thu, 28 Sep 2000 10:35:42 -0400 From: Dan Moschuk <dan@FreeBSD.org> To: Kris Kennaway <kris@FreeBSD.org> Cc: audit@FreeBSD.org Subject: Re: tcpdump security vulnerabilities Message-ID: <20000928103542.A38089@spirit.jaded.net> In-Reply-To: <Pine.BSF.4.21.0009272116480.31282-100000@freefall.freebsd.org>; from kris@FreeBSD.org on Wed, Sep 27, 2000 at 09:24:10PM -0700 References: <Pine.BSF.4.21.0009272116480.31282-100000@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
| Hi, | | I happened to be taking a look through the tcpdump 3.5 source tonight and [ snip ] | Please review this patch - if this is acceptable to the tcpdump guys, I'll | commit it to FreeBSD and release an advisory shortly thereafter. The patch seems fairly harmless, but remember that tcpdump is contrib code and the patch should go the maintainers first. To increase the chance of them accepting it, you may want to roll your own snprintf() routine for the few remaining OSs that don't have it, or hint that they should do it if they want their code to compile on older versions of Solaris. :) Cheers! -Dan -- Man is a rational animal who always loses his temper when he is called upon to act in accordance with the dictates of reason. -- Oscar Wilde To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-audit" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000928103542.A38089>