public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-user] CoreOS vulnerability inherited from Gentoo?
@ 2016-05-31 16:30 James
  2016-05-31 17:44 ` Mick
  0 siblings, 1 reply; 10+ messages in thread
From: James @ 2016-05-31 16:30 UTC (permalink / raw
  To: gentoo-user

 Here is an interesting read::

Security brief: CoreOS Linux Alpha remote SSH issue
May 19, 2016 · By Matthew Garrett 

<snippets>

Gentoo defaults to ending the PAM configuration with an optional pam_permit.

This meant that failing both pam_unix and pam_sss on CoreOS systems would
surprisingly result in authentication succeeding, and access being granted.

The operator user was not used by CoreOS, but existed because it exists in
the Gentoo Portage system from which CoreOS is derived.  
<end/snippets>

Full read [1]. It kinda shows that CoreOS is derived from Gentoo 
and not ChromeOS; at least when time to blame a security lapse elsewhere....


enjoy,
James

[1] https://coreos.com/blog/

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2016-06-02 16:22 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-05-31 16:30 [gentoo-user] CoreOS vulnerability inherited from Gentoo? James
2016-05-31 17:44 ` Mick
2016-05-31 17:59   ` Michael Cook
2016-05-31 18:44     ` [gentoo-user] " James
2016-05-31 18:07   ` [gentoo-user] " Max R.D. Parmer
2016-05-31 21:02     ` Max R.D. Parmer
2016-06-01  7:11   ` Neil Bothwick
2016-06-02 13:44     ` [gentoo-user] " James
2016-06-02 14:31       ` Max R.D. Parmer
2016-06-02 16:21         ` James

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox