Kelly Black <kelly-black at mediaone.net> wrote: > > Crap: > Local root hole. Could be more remote, but untested... > More info here: > http://www.pine.nl/advisories/pine-cert-20020301.txt If the hole is also remotely-exploitable, ignore me, but I think most folks can just `chmod -s /usr/bin/ssh' (removing the Set-UID flag) without patching.. Of course, that's only a stop-gap solution. SSH works fine without the Set-UID flag set, though I think you can't do ssh RSA/DSA public key authentication (but that might no longer be the case). -- _ _ _ _ _ ___ _ _ _ ___ _ _ __ I'm writing an unauthorized / \/ \(_)| ' // ._\ / - \(_)/ ./| ' /(__ autobiography. \_||_/|_||_|_\\___/ \_-_/|_|\__\|_|_\ __) [ Mike Hicks | http://umn.edu/~hick0088/ | mailto:hick0088 at tc.umn.edu ] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20020307/a030323d/attachment.pgp