Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Feb 2003 18:54:37 -0800
From:      David Schultz <dschultz@uclink.Berkeley.EDU>
To:        pura life CR <puralifecr@hotmail.com>
Cc:        freebsd-chat@FreeBSD.ORG
Subject:   Re: 2 Misc questions
Message-ID:  <20030215025437.GA3750@HAL9000.homeunix.com>
In-Reply-To: <F36UzmRf6Ci6nx8dyDd0001948d@hotmail.com>
References:  <F36UzmRf6Ci6nx8dyDd0001948d@hotmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Thus spake pura life CR <puralifecr@hotmail.com>:
> Hi, I have a couple of question that dont allow me to sleep properly.
> here we go:
> 1. is this suid root code exploitable with a buffer overflow technique:
> /* foo.c */
> main(int argc, char *argv[]){
> ...
> setuid(0)
> ...
> if ( ((strcmp(argv[i],"foo")) == 0)
>    || ((strcmp(argv[i],"bar")) == 0) )
> ....
> }

No, but write another few thousand lines and we'll see...

> 2. how can I redirect stderr to /dev/null? for example when I am 'finding' 
> a file in the whole dir tree I dont want to look at the "permised denied" 
> warning.
> ej: find / -name "foo" -print > /dev/null &  <--- how to redict stderr

In the C shell, you can't do it in a direct way.  You have to say:

	( my-command > /dev/tty ) >& /dev/null

In the Bourne shell, you just say:

	my-command 2>/dev/null

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030215025437.GA3750>