From owner-freebsd-security Thu Jun 27 14:00:40 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id OAA25502 for security-outgoing; Thu, 27 Jun 1996 14:00:40 -0700 (PDT) Received: from passer.osg.gov.bc.ca (passer.osg.gov.bc.ca [142.32.110.29]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id OAA25496 for ; Thu, 27 Jun 1996 14:00:37 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by passer.osg.gov.bc.ca (8.7.5/8.6.10) with SMTP id OAA14831 for freebsd-security@freebsd.org; Thu, 27 Jun 1996 14:00:32 -0700 (PDT) From: Cy Schubert - ITSD Open Systems Group Message-Id: <199606272100.OAA14831@passer.osg.gov.bc.ca> X-Authentication-Warning: passer.osg.gov.bc.ca: Host localhost [127.0.0.1] didn't use HELO protocol Reply-to: cschuber@orca.gov.bc.ca X-Mailer: DXmail To: freebsd-security@freebsd.org Subject: Ypwhich Hole Date: Thu, 27 Jun 96 14:00:32 -0700 X-Mts: smtp Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk There's been a little discussion about a ypwhich hole under FreeBSD 2.1.0R. In order to plug the hole as quickly and as easily as possible, for the moment, would replacing the 2.1.0 version of ypwhich with the one in current fix the problem or does the problem exist in a library or in the kernel? Regards, Phone: (604)389-3827 Cy Schubert OV/VM: BCSC02(CSCHUBER) Open Systems Support BITNET: CSCHUBER@BCSC02.BITNET ITSD Internet: cschuber@uumail.gov.bc.ca cschuber@bcsc02.gov.bc.ca "Quit spooling around, JES do it."