Bug#505271: closed ... fixed in shadow 1:4.1.1-6

2009-01-26 Thread Thijs Kinkhorst
On Friday 23 January 2009 04:06, Paul Szabo wrote: Belatedly, I realize that this still leaves a DoS attack: fill up utmp with entries for all possible PIDs, then login will fail. Maybe that is properly Bug#505071 (as distinct from this one)? Please see there about ideas on how to perform this

Bug#505271: closed ... fixed in shadow 1:4.1.1-6

2009-01-22 Thread Paul Szabo
Thanks for the DSA-1709 fix. Belatedly, I realize that this still leaves a DoS attack: fill up utmp with entries for all possible PIDs, then login will fail. Maybe that is properly Bug#505071 (as distinct from this one)? Please see there about ideas on how to perform this DoS without access to

Bug#505271: closed ... fixed in shadow 1:4.1.1-6

2009-01-14 Thread Thijs Kinkhorst
Hi Paul, On Thursday 27 November 2008 10:13, Paul Szabo wrote: How long do you expect it will take to in fact fix this bug (which is closed, pretend-fixed, still set to just serious severity)? Would it cause problems if I posted the exploit on Monday 1 Dec? Sorry for the delay incurred in

Bug#505271: closed ... fixed in shadow 1:4.1.1-6

2008-11-27 Thread Paul Szabo
Dear Nicolas and Moritz, How long do you expect it will take to in fact fix this bug (which is closed, pretend-fixed, still set to just serious severity)? Would it cause problems if I posted the exploit on Monday 1 Dec? Thanks, Paul Paul Szabo [EMAIL PROTECTED]

Bug#505271: closed ... fixed in shadow 1:4.1.1-6

2008-11-22 Thread Paul Szabo
Please fix for etch also. Please issue DSA. Please alert other Linux distros, they are also affected. Since you claim this issue is fixed, surely (?!) there is no harm in making the exploit public. Should (may) I do that now? Cheers, Paul Paul Szabo [EMAIL PROTECTED]