Date: Tue, 29 Nov 2011 08:09:16 -0600 From: "Patrick J. Volkerding" <security@...ckware.com> To: Raphael Bastos <tecnologia@...tosservice.com.br> CC: oss-security@...ts.openwall.com Subject: Re: Fwd: Bug script install slackware Hello, While I'm sure there are a number of bugs in the crufty old installer scripts, I'll need to know how there's a security impact before notifying everyone that the sky has fallen. I'd also like to note that if running the installer requires physical access to the machine I'm liable to consider security to already be non-existent at that time. Please clarify what is wrong with examples of how to reproduce the issue, and I'll look into it. Thanks. On 11/28/2011 05:18 PM, Raphael Bastos wrote: > ---------- Forwarded message ---------- > From: Raphael Bastos<tecnologia@...tosservice.com.br> > Date: 2011/10/28 > Subject: Bug script install slackware > To: volkerdi@...ckware.com > > > Take a look.... this is the correction sugest to script "SeTpartitions". > > EX: sed ,'/mnt','$T_PX',g --- on lines 374, 495, 496, 503. > > livecd setup # cat -n SeTpartitions |grep T_PX > 10 T_PX=/mnt > 374 mount $ROOT_DEVICE $T_PX -t $ROOT_SYS_TYPE 1> $REDIR 2> $REDIR > 495 if [ ! -d $T_PX/$MTPT ]; then > 496 mkdir -p $T_PX/$MTPT > 503 mount $NEXT_PARTITION $T_PX/$MTPT -t $NEXT_SYS_TYPE 1> > $REDIR 2> $REDIR > > > Att, > Raphael Bastos aka chemonz > > =============================================== > Bastos Service Manutenção Industrial Ltda. > www.bastosservice.com.br > Linux Reg. User: 388431 // LPI ID: LPI000214711 > email:~> $ echo "vgepqnqikcBdcuvquugtxkeg0eqo0dt" | perl -pe \ > 's/(.)/chr(ord($1)-2)/ge' > ===============================================
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.