Wichert Akkerman <[EMAIL PROTECTED]> writes: > ------------------------------------------------------------------------ > Debian Security Advisory DSA-134-2 [EMAIL PROTECTED] > http://www.debian.org/security/ Wichert Akkerman > June 25, 2002 > ------------------------------------------------------------------------ > > > Package : ssh > Problem type : remote exploit > Debian-specific: no
Has anyone applied this update yet? I did so on a potato box, enabled priv separation in the sshd config file and restarted sshd. I saw that a user called sshd was created. However, when I ssh'ed in, I didn't see any processes owned by sshd. In fact, the ssh daemon process was still owned by root. Anybody have any thoughts on this? Does priv sep work in potato? -- --Kruskal -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

