[17481] in bugtraq
dump issues with Conectiva Linux
daemon@ATHENA.MIT.EDU (Andreas Hasenack)
Sat Nov 4 01:33:45 2000
Mail-Followup-To: Andreas Hasenack <andreas@conectiva.com.br>,
bugtraq@securityfocus.com, lwn@lwn.net,
security-alert@linuxsecurity.com, linuxlist@securityportal.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id: <20001103165717.D9392@conectiva.com.br>
Date: Fri, 3 Nov 2000 16:57:17 -0200
Reply-To: Andreas Hasenack <andreas@CONECTIVA.COM.BR>
From: Andreas Hasenack <andreas@CONECTIVA.COM.BR>
X-To: lwn@lwn.net, security-alert@linuxsecurity.com,
linuxlist@securityportal.com
To: BUGTRAQ@SECURITYFOCUS.COM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Our last mandatory update of the dump package (June 29th, 2000)
brought it up to version 0.4b18 and had the SUID bits disabled.
These packages do not have the vulnerability discussed earlier in
bugtraq that could give a local attacker root access.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE6Awq942jd0JmAcZARAh/RAJ0aVqSfzWKmlV3j7OVXuT0VAkAi3QCfSkAH
Cl1nBxPzSDfEJls9TebFfV4=
=sDQ/
-----END PGP SIGNATURE-----