Hello,

  I remove suid permissions in this upload:
  http://mentors.debian.net/debian/pool/main/a/acon/acon_1.0.5-7.dsc

On Sun, Apr 13, 2008 at 04:55:19PM +0200, Nico Golde wrote:
> reopen 475733
> thanks
> 
> Hi,
> * Helmut Grohne <[EMAIL PROTECTED]> [2008-04-13 16:36]:
> > >    * Dropped 05_setuid.diff as it can cause a root exploit. (Closes: 
> > > #475733)
> > 
> > This is not enough, because it still has seved set userid and is
> > exploitable:
> [...] 
> As stated before the code only changes the effective user id 
> and thus any overflow that ships a seteuid(0) in the shell 
> code can get the privileges back. Please drop the privileges 
> properly or fix the buffer overflow.
---end quoted text---

-- 
 أحمد المحمودي (Ahmed El-Mahmoudy)
  Digital design engineer
  SySDSoft, Inc.
 GPG KeyID: 0x9DCA0B27 (@ subkeys.pgp.net)
 GPG Fingerprint: 087D 3767 8CAC 65B1 8F6C  156E D325 C3C8 9DCA 0B27



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to