From owner-freebsd-security Tue Aug 13 12:14:42 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id MAA04238 for security-outgoing; Tue, 13 Aug 1996 12:14:42 -0700 (PDT) Received: from bitbucket.edmweb.com (bitbucket.edmweb.com [204.244.190.9]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id MAA04229 for ; Tue, 13 Aug 1996 12:14:33 -0700 (PDT) Received: (from steve@localhost) by bitbucket.edmweb.com (8.6.12/8.6.12) id MAA00212; Tue, 13 Aug 1996 12:14:20 -0700 Date: Tue, 13 Aug 1996 12:14:17 -0700 (PDT) From: Steve Reid To: freebsd-security@freebsd.org Subject: Re: Vulnrability in all known Linux distributions In-Reply-To: <32100CD9.33FBC5AF@mymail.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Has anyone run through FreeBSD suid binaries looking for bad bounds-checking? On Tue, 13 Aug 1996, bloodmask wrote: > Date: Tue, 13 Aug 1996 07:04:25 +0200 > From: bloodmask > To: Multiple recipients of list BUGTRAQ > Subject: Vulnrability in all known Linux distributions [snip] > After finding this one, we at covin decided it's time to put an end to > this issue, and we've begun scanning all of Linux's suid binaries for > other hints of these hidden "features", Results will be released soon.