Subject: Re: CERT Advisory CA-99.12 - Buffer Overflow in amd
To: None <current-users@netbsd.org>
From: Christos Zoulas <christos@zoulas.com>
List: current-users
Date: 09/16/1999 22:32:13
In article <x7671a7fbn.fsf@dailyplanet.wsrcc.com>,
Wolfgang Rupprecht <wolfgang@wsrcc.com> wrote:
>
>Cert has just issued an advisory for a root-penetrating buffer
>overflow bug in AMD.
>
>NetBSD is not mentioned as either having or not having the bug.  I
>assume it does fall into one of those two categories. ;-) Anyone know
>which one??

Yes, current has been fixed, 1.4.1 is vulnerable. 1.4.2 will not be
[hopefully, if I get some spare time.]

christos