[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#240953: Debian bug #240953: reported upstream



Hi.
The Debian bug you reported ("ssh: broken pam_krb5") has a corresponding upstream bug report, which has more detail:

http://bugzilla.mindrot.org/show_bug.cgi?id=688

Note that the solution of enabling threads opens sshd up to any number or race conditions with any PAM module. Since the LinuxPAM docs give module writers a license to write thread-unsafe code [1] I recommend that you do *not* do this in the Debian package.

[1] http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam_appl-4.html#ss4.1

--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.





Reply to: