lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1157225765.20040907131857@SECURITY.NNOV.RU>
Date: Tue, 7 Sep 2004 13:18:57 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: Jйrфme ATHIAS <jerome.athias@...amail.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: cdrdao local root exploit


Dear Jйrфme ATHIAS,

This  bug  was  originally  reported  to  Bugtraq  by Andreas Mueller on
January, 15 2002

--Sunday, September 5, 2004, 11:16:42 PM, you wrote to bugtraq@...urityfocus.com:

JA> if [ ! -L $HOME/.cdrdao ];then echo "Could'n link to \$HOME/.cdrdao"



-- 
~/ZARAZA
Неприятности начнутся в восемь.  (Твен)



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ