[Secure-testing-team] Re: Bug#301430: Multiple exploitable race conditions in
openmosixview
Hubert Chan
hubert at uhoreg.ca
Fri Apr 8 22:25:16 UTC 2005
On 2005-04-01 02:39:57 -0500 Francesco P. Lovergine
<frankie at debian.org> wrote:
>
> Nice news. I'll keep an eye to the proposed patches before committing.
> The symlink exploit should be obviously manageable.
>
Upstream says that he also thinks my patches fix the bug.
http://sourceforge.net/mailarchive/message.php?msg_id=11350217
Rexotec (the guys who originally reported the bug) has't responded. I
think those patches are ready to be applied.
--
Hubert Chan <hubert at uhoreg.ca> - http://www.uhoreg.ca/
PGP/GnuPG key: 1024D/124B61FA
Fingerprint: 96C5 012F 5F74 A5F7 1FF7 5291 AF29 C719 124B 61FA
Key available at wwwkeys.pgp.net. Encrypted e-mail preferred.
More information about the Secure-testing-team
mailing list