Full Disclosure mailing list archives
[SECURITY] [DSA 139-1] New super packages fix local root exploit
From: <gobbles () hushmail com>
Date: Tue, 22 Jun 2004 02:39:27 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi max! Hehehe, not sure what funnier, Debian sta(b)le policy that make GOBBLES confused about he patching, or fact that took two years after he initial FULL DISCLOSURE of trivial pre-auth bug to find kindergarten post-auth bug of many similarity. Good job max, you a hero. It still a mystery! ;PPppPP Noone think: "hmm, friend GOBBLES, you find many bugs in SUPER program , it in Error(), maybe do grep style stuff on Error() to see if he report full QA report?". GOBBLES not sure but think it amusing! ;PPPppP Love, GOBBLES2002 GOBBLES () hushmail com
error_command =3D NULL; error_stderr =3D 0; - Error(0, 0, logbuf); + Error(0, 0, "%s", logbuf); error_stderr =3D e; error_command =3D ec;
-----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkDX/jEACgkQHNGnlyGZsA/ZbgCeLTUs1jqMFUL6ajczWXXOtKM1Xr4A oLoYyReXdbyB+RjmvgavfBQr/JFV =dwaZ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: [SECURITY] [DSA 139-1] New super packages fix local root exploit gobbles (Jun 21)
- Re: [SECURITY] [DSA 139-1] New super packages fix local root exploit Max Vozeler (Jun 21)
- <Possible follow-ups>
- [SECURITY] [DSA 139-1] New super packages fix local root exploit gobbles (Jun 22)