[12067] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Linux GNOME exploit

daemon@ATHENA.MIT.EDU (Slackware Security Team)
Thu Sep 30 14:08:07 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.9909291739120.31945-100000@www.slackware.com>
Date:         Wed, 29 Sep 1999 17:52:59 -0700
Reply-To: Slackware Security Team <security@SLACKWARE.COM>
From: Slackware Security Team <security@SLACKWARE.COM>
X-To:         Ron DuFresne <dufresne@WINTERNET.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.GSO.4.05.9909290227060.11603-100000@tundra.winternet.com>

On Wed, 29 Sep 1999, Ron DuFresne wrote:
> Also, since slackware as well <slackware 4.0> documents:
>
> - Large repository of contributed software compiled and ready to run. This
>   includes GNOME 1.0.

It doesn't include any setuid programs linked with the GNOME libraries
(not a good idea), and isn't vulnerable to this problem.  Try looking next
time.

> The GNOME troubles were cross posted to slackware-security@slackware.com,
> though, this looks to be a dead list since nothing has rooled backout of
> it for two days....

You must have prior approval to post on slackware-security.  Security
reports should be mailed to this address, or support@slackware.com.  If
they're legit, we'll pass them along to the list.

Take care,

Pat

---
Patrick J. Volkerding
volkerdi@slackware.com

home help back first fref pref prev next nref lref last post