From owner-freebsd-ports Wed Dec 15 20: 3:11 1999 Delivered-To: freebsd-ports@freebsd.org Received: from viper.lovett.com (viper.lovett.com [216.60.121.173]) by hub.freebsd.org (Postfix) with ESMTP id 6B0201544D for ; Wed, 15 Dec 1999 20:03:05 -0800 (PST) (envelope-from ade@lovett.com) Received: from ade by viper.lovett.com with local (Exim 3.03 #1) id 11yS86-000Oit-00; Wed, 15 Dec 1999 22:03:02 -0600 Date: Wed, 15 Dec 1999 22:03:02 -0600 From: Ade Lovett To: Spidey Cc: ports@freebsd.org Subject: Re: Fwd: FreeBSD 3.3 xsoldier root exploit Message-ID: <19991215220302.F93091@lovett.com> References: <14424.25185.473372.422010@anarcat.dyndns.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i In-Reply-To: <14424.25185.473372.422010@anarcat.dyndns.org>; from beaupran@iro.umontreal.ca on Wed, Dec 15, 1999 at 10:54:09PM -0500 Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Wed, Dec 15, 1999 at 10:54:09PM -0500, Spidey wrote: > > Hi. Some buddy here thought it to be a good idea to scrap FBSD's > reputation on Bugtraq, and it's going well. > > It's not the first time he posts about an exploit on a program part of > the ports... > > [snip] > > For now, it would be a _great_ idea to scrap the setuid bit on that > darn xsoldier. :) It was - earlier this evening: http://www.freebsd.org/cgi/cvsweb.cgi/ports/games/xsoldier/patches/patch-ac -aDe -- Ade Lovett, Austin, TX. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message