Date: Sat, 28 Aug 1999 03:00:18 -0400 (EDT) From: Andriss <andriss@andriss.com> To: questions@freebsd.org Subject: Re: Chflags vulnerability in FreeBSD? Message-ID: <Pine.BSF.4.10.9908280257510.53843-100000@netmint.com>
next in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Two quick questions, one about chflags, and one about periodic: 1. Is the so called "Chflags vulnerability" present in the cdrom release of 3.2? If not, what is the last release to have the vulnerability? When was it fixed? 2. As far as I understand, setting core dump size to zero through login.access will disallow all kernel dumps. Is this true? Will it also fix the problem recently posted here? Thank you, Andriss - -- ______________________________________________________________ Andrey Kholodenko <andriss@andriss.com> http://www.andriss.com Download My Public PGP Key From http://www.andriss.com/pgp.txt ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBN8eJBiQe9jf/ODl9AQEAhQP/ZUuexAZzqdEJFflLf2sWiSkvF6BnapLc rBe/Xd074VZphHVm0AR67Fit89mvUdhUB4hgIYebd1iEQvVQKQp/EG5aqDb0r6mJ DeIl8eXE043SQ++k0iodD8gMMRNQQtxm/ZbJ5ZwofQP1JnOKGxWhA7qPIdiiO1h5 tm32rN3UjDw= =6g48 -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9908280257510.53843-100000>