Package: mount
Version: 2.11n-7
Severity: critical
File: /bin/umount
Tags: security
Justification: root security hole
Please see
http://www.securityfocus.com/archive/1/410333
for details. Verified (that noexec flag is gone) as follows:
psz:~$ id
uid=1001(psz) gid=1001(amstaff)
#s11.1.12.2
[6] http://hackersplayground.org/papers/sendmailholes.txt
[7] http://lists.debian.org/debian-doc/2001/08/msg00041.html
[8] http://lists.debian.org/debian-user/2003/12/msg02057.html
Cheers,
Paul Szabo [EMAIL PROTECTED] http://www.maths.usyd.edu.au/u/psz/
School of Mathematics
+harmful
http://www.washington.edu/imap/documentation/BUILD.html
-
Thanks,
Paul Szabo [EMAIL PROTECTED] http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics University of SydneyAustralia
-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux
601 - 603 of 603 matches
Mail list logo