Gentoo Archives: gentoo-user

From: James <wireless@×××××××××××.com>
To: gentoo-user@l.g.o
Subject: [gentoo-user] CoreOS vulnerability inherited from Gentoo?
Date: Tue, 31 May 2016 16:30:55
Message-Id: loom.20160531T182442-236@post.gmane.org
1 Here is an interesting read::
2
3 Security brief: CoreOS Linux Alpha remote SSH issue
4 May 19, 2016 · By Matthew Garrett
5
6 <snippets>
7
8 Gentoo defaults to ending the PAM configuration with an optional pam_permit.
9
10 This meant that failing both pam_unix and pam_sss on CoreOS systems would
11 surprisingly result in authentication succeeding, and access being granted.
12
13 The operator user was not used by CoreOS, but existed because it exists in
14 the Gentoo Portage system from which CoreOS is derived.
15 <end/snippets>
16
17 Full read [1]. It kinda shows that CoreOS is derived from Gentoo
18 and not ChromeOS; at least when time to blame a security lapse elsewhere....
19
20
21 enjoy,
22 James
23
24 [1] https://coreos.com/blog/

Replies

Subject Author
Re: [gentoo-user] CoreOS vulnerability inherited from Gentoo? Mick <michaelkintzios@×××××.com>