Wichert Akkerman <[EMAIL PROTECTED]> writes:

> ------------------------------------------------------------------------
> Debian Security Advisory DSA-134-2                   [EMAIL PROTECTED]
> http://www.debian.org/security/                         Wichert Akkerman
> June 25, 2002
> ------------------------------------------------------------------------
> 
> 
> Package        : ssh
> Problem type   : remote exploit
> Debian-specific: no

Has anyone applied this update yet?  I did so on a potato box, enabled
priv separation in the sshd config file and restarted sshd.  I saw
that a user called sshd was created.  However, when I ssh'ed in, I
didn't see any processes owned by sshd.  In fact, the ssh daemon
process was still owned by root.

Anybody have any thoughts on this?  Does priv sep work in potato?

-- 
--Kruskal


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to