Date: Fri, 13 Jul 2001 09:41:09 -0400 (EDT) From: Jim Sander <jim@federation.addy.com> Cc: security@FreeBSD.ORG Subject: Re: FreeBSD 4.3 local root Message-ID: <Pine.BSF.4.10.10107130919001.69229-100000@federation.addy.com> In-Reply-To: <20010712152545.B20322@xor.obsecurity.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Since the release of this advisory I've been doing nightly cvsups (using stable-supfile) and a daily 'make world' and remade/installed the (mildly) customized kernel I use. *** The exploit still works. *** Can anyone verify this has really been applied, and that it fixed the problem, or steer me in the direction of how to tell what I'm doing wrong? By the way, I applied the patches manually to several 3.x systems and everything works as expected: no root sh, and nothing else seems to break. Couldn't possibly have been much easier, barring a server-monkey to do the actual typing for me. -=Jim=- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.10107130919001.69229-100000>