On Mon, Feb 27, 2006 at 01:55:10PM +1100, Julien Goodwin wrote:
> On 27/02/2006 9:28 AM, Steve Langasek wrote:
> > On Mon, Feb 27, 2006 at 12:23:35AM +1100, Julien Goodwin wrote:
> >> This bug should be able to be closed as fixed in version 0.79.

> > No, it shouldn't.  This bug is known to be present in the Debian pam 0.79
> > package, which includes a patch from the Debian selinux maintainers which
> > does indeed open this (relatively minor) security hole.

> Hmm, ok then, but why is it still open several months after being
> discovered if we know exactly what the problem is?

Because it's a low-risk vulnerability (no direct privilege escalation, just
a brute-force vector) that only affects users running SELinux-enabled
kernels in non-enforcing mode, and I disagree with upstream about the
appropriate fix for the bug.

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
[EMAIL PROTECTED]                                   http://www.debian.org/

Attachment: signature.asc
Description: Digital signature

Reply via email to