Summary: | sys-apps/pam | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Daniel Ahlberg (RETIRED) <aliz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | critical | CC: | azarah, pam-bugs+disabled, woodchip |
Priority: | Highest | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Daniel Ahlberg (RETIRED)
![]() I cant reproduce this no matter how hard I try. Can anybody else reproduce/confirm and or debunk this on gentoo? Our example have the use_uid. Have not tried without it though. if we can't reproduce this and our default has use_uid and no trust anyway why not mark this invalid? I tried reproducing this bug using PAM 0.77 on x86 to no avail. I agree with Method - if use_uid is on by default and the flaw can't be reproduced, it's invalid. |