The debian-private mailing list leak, part 1. Volunteers have complained about Blackmail. Lynchings. Character assassination. Defamation. Cyberbullying. Volunteers who gave many years of their lives are picked out at random for cruel social experiments. The former DPL's girlfriend Molly de Blanc is given volunteers to experiment on for her crazy talks. These volunteers never consented to be used like lab rats. We don't either. debian-private can no longer be a safe space for the cabal. Let these monsters have nowhere to hide. Volunteers are not disposable. We stand with the victims.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: smbmount root exploit



Thomas Koenig <ig25@mvmap66.ciw.uni-karlsruhe.de> writes:
> Alan Cox wrote:
> 
> >** This code exploits a buffer overflow in smbmount from smbfs-2.0.1.
> 
> Argh.
> 
> Looks like we need to do a security audit, like one of the *BSD teams did.
> Anybody volunteering?
> 
> With the new Checker, it should be possible to check all security-relevant
> programs against buffer overflows, for a start.  We'll also need
> code-walkthroughs...

We'll also find a lot of bugs in Checker, I'm sure.  Start them coming
in, guys!

For that matter I've found about four different bugs in glibc just by
compiling and running ordinary programs with Checker.  (They've been
reported and supposedly fixed for 2.0.4.)
-- 
Ben Pfaff <pfaffben@pilot.msu.edu>        http://www.msu.edu/user/pfaffben
PGP key: http://www.msu.edu/user/pfaffben/pgp.html or a keyserver near you
Linux: choice of a GNU generation -- Debian GNU/Linux: the only free Linux


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-private-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .