Package: pam
Severity: important
Tags: security

Quoting from a Gentoo advisory:
| The SELinux patches for PAM introduce a vulnerability allowing a
| password to be checked with the unix_chkpwd utility without delay or
| logging. This vulnerability doesn't affect users who do not run
| SELinux.

This does only affect testing/sid and has been assigned CVE-2005-2977.

        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-rc1
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to