Date: Sun, 29 Mar 1998 22:35:39 -0800 (PST) From: Doug White <dwhite@gdi.uoregon.edu> To: unix3@usa.net Cc: questions@FreeBSD.ORG Subject: Re: your mail Message-ID: <Pine.BSF.3.96.980329223254.23543T-100000@gdi.uoregon.edu> In-Reply-To: <19980329024233.801.qmail@www0a.netaddress.usa.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 29 Mar 1998 unix3@usa.net wrote: > i noticed though that this version (2.2.5) came with > perl 4. 2.2.6 just came the other day, btw. > is this version exploitable to gain root access? or did > you very well patch it? should i go and change to the > newest version? or have you fixed it when it was released? I don't know if the supplied version is exploitable or not. Run Perl scripts suid root is dangerous anyway, and should probably be disabled by deleteing sperl* from your /usr/bin directory. > also is there a place where i can get a list of any > other out of the box bugs that i should fix? or the patches > for all of them at once? or something like that? See http://www.freebsd.org/releases/2.2.5R/errata.html for important notes, and ftp://ftp.freebsd.org/pub/FreeBSD/CERT/ for any outstanding security advisories. Doug White | University of Oregon Internet: dwhite@resnet.uoregon.edu | Residence Networking Assistant http://gladstone.uoregon.edu/~dwhite | Computer Science Major To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980329223254.23543T-100000>