Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 7 Jun 2011 09:08:21 +0200
From: Sebastian Krahmer <krahmer@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: pam_ssh not dropping root gid(s)


It might not be the worst issue ever, true, but it somehow doesnt sound right to
me starting a user ssh-agent with gid 0.

Sebastian

On Mon, Jun 06, 2011 at 02:03:07PM -0400, Josh Bressers wrote:
> ----- Original Message -----
> > Hi,
> > 
> > In certain configs, pam_ssh is not completely dropping its privileges to
> > user. It just forgets to call setgid() and initgroups(). A fix can be
> > found at [1].  Can someone assign a CVE?
> > 
> > thx,
> > Sebastian
> > 
> > [1] https://bugzilla.novell.com/show_bug.cgi?id=665061
> > 
> 
> Is this a security flaw? From doing a little ssh-agent research, it sounds
> harmless without another flaw. I'm not terribly familiar with it though, so
> I could be missing something.
> 
> Thanks.
> 
> -- 
>     JB

-- 

~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@...e.de - SuSE Security Team

---
SUSE LINUX Products GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 16746 (AG Nürnberg)
Maxfeldstraße 5
90409 Nürnberg
Germany

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ