Hi. Just a short note: We ship gdm with "Enable=0", so we are not vulnerable to this kind of attack. Older SuSE releases, which ship with gdm 1.x, have "Enable" set to 1 but seem not to be vulnerable by this bug. Bye, Thomas -- Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg E@mail: [EMAIL PROTECTED] Function: Security Support & Auditing "lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka" Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47
