Jeffrey <jeffbenct...@gmail.com> writes:

> I found more occurences of unchecked values for set*id() functions in other
> inetutils programs: ftpd, rcp.
>
> It has different security impact if it can be triggered:
>
> * rcp: local privilege escalation to the user running the binary
> * ftpd: undefined behaviour without privilege escalation as all calls are
> to seteuid(0) (gaining root privileges, not dropping it)
>
> I am attaching a consolidated patch to fix these and the previous ones.

Thanks again -- copyright papers have now arrived, and I looked at the
patch, and it seems good.  However the patch does not apply cleanly due
to whitespace and line-wrapping problems, can you re-send the patch as
an attachment instead of inline in your email?  Please also add NEWS
entries (look at earlier entries as templates).

/Simon

Attachment: signature.asc
Description: PGP signature

  • setuid/setg... Jeffrey
    • Re: se... Jeffrey
      • Re... Simon Josefsson via Bug reports for the GNU Internet utilities
      • Re... Simon Josefsson via Bug reports for the GNU Internet utilities
        • ... Jeffrey
          • ... Simon Josefsson via Bug reports for the GNU Internet utilities

Reply via email to