Date: Mon, 31 Aug 1998 10:28:37 +0900
From: Scott Stone <[email protected]>
To: [email protected]Subject: SEYON vulnerability in TurboLinux 2.0
After reading the seyon security problem report from SGI, I checked
TurboLinux 2.0 to see if it runs as setuid root - the situtation turns out
to be the same as for Debian/GNU Linux - TurboLinux 2.0 does NOT install
seyon setuid root, and is therefore NOT vulnerable to the problem.
--------------------------------------------------
Scott M. Stone <[email protected], [email protected]>
<[email protected]>
Head of TurboLinux Development/Systems Administrator
Pacific HiTech, Inc (USA) / Pacific HiTech, KK (Japan)
http://www.pht.comhttp://armadillo.pht.co.jphttp://www.pht.co.jphttp://www.turbolinux.com