[Bug 2107] seccomp sandbox breaks GSSAPI
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Mon Aug 13 18:24:06 AEST 2018
https://bugzilla.mindrot.org/show_bug.cgi?id=2107
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|FIXED |---
Status|CLOSED |REOPENED
--- Comment #13 from Jakub Jelen <jjelen at redhat.com> ---
(In reply to Damien Miller from comment #12)
> Created attachment 3168 [details]
> cache OIDs unconditionally
>
> I can't think of any reason we can't prime the cache unconditionally.
That is probably the only way with the downside of having some overhead
for non-GSSAPI mechanisms or potentially larger attack surface, but if
you are fine with this change, I would be glad to have this addressed
in the next release.
I will reopen the bug to make sure it will not get lost.
Thank you.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list