Date: Sat, 02 Aug 1997 14:02:26 -0600 From: Warner Losh <imp@village.org> To: Ben Black <black@zen.cypher.net> Cc: Sergio Lenzi <lenzi@bsi.com.br>, hackers@freebsd.org Subject: Re: security hole on FreeBSD 2.2.2 Message-ID: <E0wukNf-0005oI-00@rover.village.org> In-Reply-To: Your message of "Fri, 01 Aug 1997 20:06:59 EDT." <Pine.LNX.3.91.970801200610.3568F-100000@zen.cypher.net> References: <Pine.LNX.3.91.970801200610.3568F-100000@zen.cypher.net>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <Pine.LNX.3.91.970801200610.3568F-100000@zen.cypher.net> Ben Black writes: : wow, with a problem report like that i'll be sure to get right on : removing superl. how about a copy of the script or an explanaition of : the bug? The problem was that you could pass a huge command line arg, overflow a buffer in some cases, and get an egg to hatch a root shell... Check out the bugtraq archive for more details. Warner
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0wukNf-0005oI-00>