Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120424124510.GB5036@suse.de>
Date: Tue, 24 Apr 2012 14:45:10 +0200
From: Sebastian Krahmer <krahmer@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization

nfs-client-1.2.5 rpm which is probably a result of the nfs-utils-1.2.5
source package.

Sebastian

On Tue, Apr 24, 2012 at 02:34:23PM +0200, Florian Weimer wrote:
> * Sebastian Krahmer:
> 
> > Indeed, the point was to also check against fscaps:
> >
> > https://bugzilla.novell.com/show_bug.cgi?id=694598
> >
> > At least it should be considered for future builds. The mount.nfs
> > case was only interesting for the suid bit.
> 
> Okay.  Our mount.nfs doesn't seem to use libgssglue.  I wonder if you
> use a different code base, or if this is something that's going to be
> come relevant to use with a newer upstream version, too.

-- 

~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@...e.de - SuSE Security Team

---
SUSE LINUX Products GmbH,
GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 16746 (AG Nürnberg)
Maxfeldstraße 5
90409 Nürnberg
Germany

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.