[22876] in bugtraq
Re: [ ** Snes9x buffer overflow vulnerability ** ]
daemon@ATHENA.MIT.EDU (Christian Surchi)
Tue Oct 16 22:18:37 2001
Date: Wed, 17 Oct 2001 02:43:01 +0200
From: Christian Surchi <csurchi@debian.org>
To: Scott Dier <dieman@ringworld.org>
Cc: Niels Heinen <zilli0n@gmx.net>, bugtraq@securityfocus.com,
vulnwatch@vulnwatch.org
Message-ID: <20011017024301.G1022@mclink.it>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="qMm9M+Fa2AknHoGS"
Content-Disposition: inline
In-Reply-To: <20011016110305.C21884@ringworld.org>; from dieman@ringworld.org on Tue, Oct 16, 2001 at 11:03:05AM -0500
--qMm9M+Fa2AknHoGS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Tue, Oct 16, 2001 at 11:03:05AM -0500, Scott Dier wrote:
> Debian unstable's snes9x 1.39-1 packages do not have setuid set by
> default. I dont have any resources to check stable.
=46rom snes9x's changelog in stable:
snes9x (1.10-1) unstable; urgency=3Dlow
* Manpages
* Binaries are no longer suid root by default
* New upstream version
-- Stephen Crowley <crow@debian.org> Sat, 10 Oct 1998 13:40:24 -0500
--=20
Christian Surchi | csurchi@debian.org | christian@firenze.linux.it =
=20
FLUG: http://www.firenze.linux.it | Debian GNU/Linux: http://www.debian.org
Writing software is more fun than working.
--qMm9M+Fa2AknHoGS
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Per informazioni si veda http://www.gnupg.org
iEYEAREBAAYFAjvM1BQACgkQDP8w4SYle2iR2QCfedDsnMINm39Pry/OQF2ypYBk
7f4An3qToudN4oV1cF4Ixp0mZROW2yUX
=4mXk
-----END PGP SIGNATURE-----
--qMm9M+Fa2AknHoGS--