From owner-freebsd-security Wed Jun 26 12:14:56 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id MAA28903 for security-outgoing; Wed, 26 Jun 1996 12:14:56 -0700 (PDT) Received: from rocky.mt.sri.com (rocky.sri.MT.net [204.182.243.10]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id MAA28897 for ; Wed, 26 Jun 1996 12:14:52 -0700 (PDT) Received: (from nate@localhost) by rocky.mt.sri.com (8.7.5/8.7.3) id NAA05459; Wed, 26 Jun 1996 13:14:32 -0600 (MDT) Date: Wed, 26 Jun 1996 13:14:32 -0600 (MDT) Message-Id: <199606261914.NAA05459@rocky.mt.sri.com> From: Nate Williams To: Brian Tao Cc: FREEBSD-SECURITY-L Subject: Re: CERT Advisory CA-96.12 - Vulnerability in suidperl (fwd) In-Reply-To: References: Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > I believe this applies to perl4 as shipped with all versions of > FreeBSD, as well as the perl5 packages/ports. Does anyone know what > the actual vulnerability is? I don't, but thanks for bringing this up. I was planning on bringing this in but I forgot. I just applied the suggested change to the version of perl in -stable and -current, so it'll be in 2.1.5. Nate