Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 04 Oct 2000 11:20:37 -0600
From:      Warner Losh <imp@village.org>
To:        Matt Heckaman <matt@ARPA.MAIL.NET>
Cc:        Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: BSD chpass 
Message-ID:  <200010041720.LAA37630@harmony.village.org>
In-Reply-To: Your message of "Wed, 04 Oct 2000 01:16:50 EDT." <Pine.BSF.4.21.0010040116090.79727-100000@epsilon.lucida.qc.ca> 
References:  <Pine.BSF.4.21.0010040116090.79727-100000@epsilon.lucida.qc.ca>  

next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSF.4.21.0010040116090.79727-100000@epsilon.lucida.qc.ca> Matt Heckaman writes:
: I've confirmed this to work on 3.5-STABLE as of Sep 21. It did NOT work on
: my 4.1-STABLE or 4.1.1-RELEASE machines, but they could still be
: vulnerable in a method outside the scope of the posted exploit. I just
: found out about this 5 minutes and ran to turn off the suid bit :P

4.1R and 4.1.1R are known to be safe.  3.5.1-stable was patched last
night at about 0600GMT.

Warner


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200010041720.LAA37630>