Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 29 Mar 1998 22:35:39 -0800 (PST)
From:      Doug White <dwhite@gdi.uoregon.edu>
To:        unix3@usa.net
Cc:        questions@FreeBSD.ORG
Subject:   Re: your mail
Message-ID:  <Pine.BSF.3.96.980329223254.23543T-100000@gdi.uoregon.edu>
In-Reply-To: <19980329024233.801.qmail@www0a.netaddress.usa.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 29 Mar 1998 unix3@usa.net wrote:

> i noticed though that this version (2.2.5) came with
> perl 4. 

2.2.6 just came the other day, btw.

> is this version exploitable to gain root access? or did
> you very well patch it? should i go and change to the 
> newest version? or have you fixed it when it was released?

I don't know if the supplied version is exploitable or not.  Run Perl
scripts suid root is dangerous anyway, and should probably be disabled by
deleteing sperl* from your /usr/bin directory.

> also is there a place where i can get a list of any 
> other out of the box bugs that i should fix? or the patches
> for all of them at once? or something like that?

See http://www.freebsd.org/releases/2.2.5R/errata.html for important
notes, and ftp://ftp.freebsd.org/pub/FreeBSD/CERT/ for any outstanding
security advisories.

Doug White                              | University of Oregon  
Internet:  dwhite@resnet.uoregon.edu    | Residence Networking Assistant
http://gladstone.uoregon.edu/~dwhite    | Computer Science Major



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980329223254.23543T-100000>