SEYON vulnerability in TurboLinux 2.0

From: Scott Stone (sstoneat_private)
Date: Sun Aug 30 1998 - 18:28:37 PDT

  • Next message: James Snow: "Re: FreeBSD's RST validation"

    After reading the seyon security problem report from SGI, I checked
    TurboLinux 2.0 to see if it runs as setuid root - the situtation turns out
    to be the same as for Debian/GNU Linux - TurboLinux 2.0 does NOT install
    seyon setuid root, and is therefore NOT vulnerable to the problem.
    
    --------------------------------------------------
    Scott M. Stone <sstoneat_private, sstoneat_private>
                   <sstoneat_private>
    Head of TurboLinux Development/Systems Administrator
    Pacific HiTech, Inc (USA) / Pacific HiTech, KK (Japan)
    http://www.pht.com              http://armadillo.pht.co.jp
    http://www.pht.co.jp            http://www.turbolinux.com
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:14:07 PDT