Bug 12814
Summary: | Buffer owerflow in slrnpull | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Joachim Blaabjerg <styx> |
Component: | slrn | Assignee: | Bill Nottingham <notting> |
Status: | CLOSED DUPLICATE | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 6.2 | CC: | rvokal |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2000-06-22 17:57:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Joachim Blaabjerg
2000-06-22 17:57:55 UTC
*** This bug has been marked as a duplicate of 12750 *** This is NOT A SECURITY THREAT!!! Someone needs to go shove a pole up Michal Zalewski's ass for reporting this as a security threat in Red Hat linux 6.2 and 6.1 because regular users CAN'T EVEN EXECUTE SLRNPULL because of it's permissions. If he had actually read my bugzilla posts instead of just skimming the contents before he took credit for finding them he would have noticed the permission on slrnpull which he did not, which makes it hard to believe he actually found this and tested it on his own. It takes all kinds... -Stan Bubrouski |