: Is removing the suid root bit the only impact of applying
: patchSG0005869? That seems to be what you're implying. If
It seems is not.
In that case, I guess you will lose the remote monitorization
feature (since it uses rsh protocol).
Anyway, patchSG0005869 includes only a /usr/sbin/gr_osview
executable, which still is setuid root, but which gives
"Permission denied" if you try the known exploit.
: that's the case, why didn't SGI see fit to release the patch
: for 6.5.22?
Get the patch, extract the file, and replace the old one.
It works (at least on 6.5.22f running on IP22).
PGP and other useless info at \
finger://daphne.cps.unizar.es/spd \ Timeo Danaos et dona ferentes
ftp://ivo.cps.unizar.es/pub/ \ (Virgilio)