From owner-freebsd-questions Tue Dec 9 11:26:49 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id LAA25932 for questions-outgoing; Tue, 9 Dec 1997 11:26:49 -0800 (PST) (envelope-from owner-freebsd-questions) Received: from mph124.rh.psu.edu (hunt@MPH124.rh.psu.edu [128.118.126.83]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id LAA25921 for ; Tue, 9 Dec 1997 11:26:43 -0800 (PST) (envelope-from hunt@mph124.rh.psu.edu) Received: (from hunt@localhost) by mph124.rh.psu.edu (8.8.7/8.8.7) id OAA13282; Tue, 9 Dec 1997 14:26:20 -0500 (EST) (envelope-from hunt) Message-ID: <19971209142619.51125@mph124.rh.psu.edu> Date: Tue, 9 Dec 1997 14:26:19 -0500 From: Matthew Hunt To: David Hawkins Cc: questions@FreeBSD.ORG Subject: Re: suidperl 4.036 in 2.2.5? References: <199712091906.LAA17317@ohio.river.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.88 In-Reply-To: <199712091906.LAA17317@ohio.river.org>; from David Hawkins on Tue, Dec 09, 1997 at 11:06:58AM -0800 Sender: owner-freebsd-questions@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Tue, Dec 09, 1997 at 11:06:58AM -0800, David Hawkins wrote: > I suppose, but newcomers aren't going to know that suidperl 4.036 > isn't secure. It might not be secure, but then again anything might not be secure. If you are referring to the old vulnerabilities in sperl 4.036, they have been long fixed in FreeBSD. There are no known security holes in it. -- Matthew Hunt * Think locally, act globally. http://mph124.rh.psu.edu/~hunt/pgp.key for PGP public key 0x67203349.