Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 May 1996 10:41:10 +1000 (EST)
From:      "Daniel O'Callaghan" <danny@lynx.its.unimelb.edu.au>
To:        Dan Polivy <danp@library.pride.net>
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: SECURITY BUG in FreeBSD (fwd)
Message-ID:  <Pine.BSI.3.91.960522103923.17222C-100000@lynx.its.unimelb.edu.au>
In-Reply-To: <Pine.BSF.3.91.960517190355.230C-100000@library.pride.net>

next in thread | previous in thread | raw e-mail | index | archive | help


On Fri, 17 May 1996, Dan Polivy wrote:

> FreeBSD has a security hole...
> dangerous is mount_union if suid is set
> vulnerable systems are: FreeBSD 2.1 RELEASE/2.2 CURRENT
> probably FreeBSD 2.1 STABLE is not vulnerable

2.0.5-RELEASE has /sbin/mount_union as 4755.  I'm not going to test it 
on a live system, but since I don't use the command, I rm'ed it.

Anyone tested 2.0.5?

Danny



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSI.3.91.960522103923.17222C-100000>