Full Disclosure mailing list archives

[SECURITY] [DSA 139-1] New super packages fix local root exploit


From: <gobbles () hushmail com>
Date: Tue, 22 Jun 2004 02:39:27 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi max!

Hehehe, not sure what funnier, Debian sta(b)le policy that make GOBBLES
confused about he patching, or fact that took two years after he initial
FULL DISCLOSURE of trivial pre-auth bug to find kindergarten post-auth
bug of many similarity. Good job max, you a hero. It still a mystery!
;PPppPP

Noone think: "hmm, friend GOBBLES, you find many bugs in SUPER program
, it in Error(), maybe do grep style stuff on Error() to see if he
report full QA report?". GOBBLES not sure but think it amusing! ;PPPppP

Love,
GOBBLES2002
GOBBLES () hushmail com

     error_command =3D NULL;
     error_stderr =3D 0;
-    Error(0, 0, logbuf);
+    Error(0, 0, "%s", logbuf);
     error_stderr =3D e;
     error_command =3D ec;
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkDX/jEACgkQHNGnlyGZsA/ZbgCeLTUs1jqMFUL6ajczWXXOtKM1Xr4A
oLoYyReXdbyB+RjmvgavfBQr/JFV
=dwaZ
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: