From owner-freebsd-questions Sat Aug 28 0: 3: 1 1999 Delivered-To: freebsd-questions@freebsd.org Received: from netmint.com (netmint.com [207.106.21.130]) by hub.freebsd.org (Postfix) with ESMTP id AADE114D01 for ; Sat, 28 Aug 1999 00:02:58 -0700 (PDT) (envelope-from andriss@andriss.com) Received: from localhost (andriss@localhost) by netmint.com (8.9.3/8.9.3) with ESMTP id DAA54157 for ; Sat, 28 Aug 1999 03:00:23 -0400 (EDT) Date: Sat, 28 Aug 1999 03:00:18 -0400 (EDT) From: Andriss X-Sender: andriss@netmint.com To: questions@freebsd.org Subject: Re: Chflags vulnerability in FreeBSD? Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG -----BEGIN PGP SIGNED MESSAGE----- Two quick questions, one about chflags, and one about periodic: 1. Is the so called "Chflags vulnerability" present in the cdrom release of 3.2? If not, what is the last release to have the vulnerability? When was it fixed? 2. As far as I understand, setting core dump size to zero through login.access will disallow all kernel dumps. Is this true? Will it also fix the problem recently posted here? Thank you, Andriss - -- ______________________________________________________________ Andrey Kholodenko http://www.andriss.com Download My Public PGP Key From http://www.andriss.com/pgp.txt ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBN8eJBiQe9jf/ODl9AQEAhQP/ZUuexAZzqdEJFflLf2sWiSkvF6BnapLc rBe/Xd074VZphHVm0AR67Fit89mvUdhUB4hgIYebd1iEQvVQKQp/EG5aqDb0r6mJ DeIl8eXE043SQ++k0iodD8gMMRNQQtxm/ZbJ5ZwofQP1JnOKGxWhA7qPIdiiO1h5 tm32rN3UjDw= =6g48 -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message