Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 6 Jun 2011 17:50:10 +0200
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Cc: Jan Lieskovsky <jlieskov@...hat.com>
Subject: Re: CVE request: pam_ssh not dropping root gid(s)

Am Montag, 6. Juni 2011, 17:06:40 schrieb Jan Lieskovsky:
...
> > [1] https://bugzilla.novell.com/show_bug.cgi?id=665061
> 
> Unfortunately not able to access this entry. Would it be possible to 
> make it public? (for further details & CVE assignment). Or will be
> access granted per email address approach necessary?

public now.


-- 
Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing
SUSE LINUX GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 21284 (AG Nürnberg
--
  Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
                            -- Marie von Ebner-Eschenbach

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ