summaryrefslogtreecommitdiffstats
path: root/release/doc/en_US.ISO8859-1/relnotes/article.sgml
diff options
context:
space:
mode:
authorbmah <bmah@FreeBSD.org>2001-10-08 21:33:56 +0000
committerbmah <bmah@FreeBSD.org>2001-10-08 21:33:56 +0000
commit32ac4271f4ad70dff22e62d543f88a8ef42cca09 (patch)
tree83aa7370ec2913851a4251b0768d7f710d040bdb /release/doc/en_US.ISO8859-1/relnotes/article.sgml
parent0e4f8324c85e26af3d70b87477787026f030fd70 (diff)
downloadFreeBSD-src-32ac4271f4ad70dff22e62d543f88a8ef42cca09.zip
FreeBSD-src-32ac4271f4ad70dff22e62d543f88a8ef42cca09.tar.gz
Update relevant release note item with SA-01:62.
Diffstat (limited to 'release/doc/en_US.ISO8859-1/relnotes/article.sgml')
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/article.sgml9
1 files changed, 7 insertions, 2 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index f367cc4..065e6a3 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -1211,13 +1211,18 @@
world-readable <filename>/etc/master.passwd</filename> has been
fixed (see security advisory FreeBSD-SA-01:59). &merged;</para>
- <para>All non-<username>root</username>-owned binaries in standard
+ <para>A vulnerability in <application>UUCP</application> has been
+ closed (see security advisory FreeBSD-SA-01:62).
+ All non-<username>root</username>-owned binaries in standard
system paths now have the <literal>schg</literal> flag set to
prevent exploit vectors when run by &man.cron.8;, by
<username>root</username>, or by a user other then the one owning
the binary. In addition, &man.uustat.1; is now run via
<filename>/etc/periodic/daily/410.status-uucp</filename> as
- <username>uucp</username>, not <username>root</username>. &merged;</para>
+ <username>uucp</username>, not <username>root</username>.
+ In &os; -CURRENT, <application>UUCP</application> has since been moved
+ to the Ports Collection and no longer a part of the base
+ system. &merged;</para>
<para>A security hole in the form of a buffer overflow in the
&man.semop.2; system call has been closed. &merged;</para>
OpenPOWER on IntegriCloud