Date: Wed, 04 Oct 2000 11:20:37 -0600 From: Warner Losh <imp@village.org> To: Matt Heckaman <matt@ARPA.MAIL.NET> Cc: Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG Subject: Re: Fwd: BSD chpass Message-ID: <200010041720.LAA37630@harmony.village.org> In-Reply-To: Your message of "Wed, 04 Oct 2000 01:16:50 EDT." <Pine.BSF.4.21.0010040116090.79727-100000@epsilon.lucida.qc.ca> References: <Pine.BSF.4.21.0010040116090.79727-100000@epsilon.lucida.qc.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.BSF.4.21.0010040116090.79727-100000@epsilon.lucida.qc.ca> Matt Heckaman writes: : I've confirmed this to work on 3.5-STABLE as of Sep 21. It did NOT work on : my 4.1-STABLE or 4.1.1-RELEASE machines, but they could still be : vulnerable in a method outside the scope of the posted exploit. I just : found out about this 5 minutes and ran to turn off the suid bit :P 4.1R and 4.1.1R are known to be safe. 3.5.1-stable was patched last night at about 0600GMT. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200010041720.LAA37630>