Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 4501 - OpenSSH/PAM overflow
Summary: OpenSSH/PAM overflow
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: x86 Linux
: High blocker (vote)
Assignee: Brandon Low (RETIRED)
URL: http://www.globalintersec.com/adv/ope...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2002-07-03 16:10 UTC by Seemant Kulleen (RETIRED)
Modified: 2003-02-04 19:42 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Seemant Kulleen (RETIRED) gentoo-dev 2002-07-03 16:10:11 UTC
url says it all. do we need to do anything other than issue an advisory, or are
there PAM thingies which need to be done?
Comment 1 Brandon Low (RETIRED) gentoo-dev 2002-07-03 16:19:13 UTC
URL Specifies versions prior to 3.4, which have all been removed (by me) from 
the portage tree.  It also specifies that it can gain the privledges of the 
daemon user which is the unpriveledged sshd user since 3.3 on our system.  We 
are safe.