| 
  | 
Message-ID: <48C1D1FF.7050704@redhat.com>
Date: Sat, 06 Sep 2008 08:42:39 +0800
From: Eugene Teo <eteo@...hat.com>
To: oss-security@...ts.openwall.com
CC: Till Maas <opensource@...l.name>, fedora-security-list@...hat.com,
        coley@...re.org
Subject: CVE request: pam_mount: conf: re-add luserconf security checks
Till Maas wrote:
> On Fri September 5 2008, Till Maas wrote:
> 
>> pam_mount just released an update that fixes a security vulnerability:
>> https://sourceforge.net/project/shownotes.php?release_id=624240
> 
> Will someone create the needed tracking bugs[1] for this and maybe request / 
> assign a CVE number?
This email was posted in fedora-security-list@rc.
v0.47 (September 04 2008)
=========================
This release incorporates a security fix (item 3 on the list).
All administrators who have enabled <luserconf> in the configuration
file should upgrade. A workaround is to comment out <luserconf>.
- mount.crypt: add missing null command to conform to sh syntax
  (SF bug #2089446)
- conf: fix printing of strings when luser volume options were not ok
- conf: re-add luserconf security checks
[...]
https://sourceforge.net/project/shownotes.php?release_id=624240
http://dev.medozas.de/gitweb.cgi?p=pam_mount;a=commitdiff;h=33b91d7659ae3aa78b1e94fd3f8e545ae5ff25db
Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.