Should we upgrade our release of rp-pppoe, per David Skoll's advice, then? -David E. Message forwarded from gmane.comp-security.bugtraq: --------------------------------------------------- Subject: Re: [FLSA-2005:152794] Updated rp-pppoe package fixes security issue From: "David F. Skoll" <devnull@xxxxxxxxxxxxxxxxxx> Newsgroups: gmane.comp.security.full-disclosure,gmane.comp.security.bugtraq Message-ID: <437A2DC8.9020401@xxxxxxxxxxxxxxxxxx> Date: Tue, 15 Nov 2005 13:49:44 -0500 Marc Deslauriers wrote: > Synopsis: Updated rp-pppoe package fixes security issue > Advisory ID: FLSA:152794 This is a totally bogus vulnerability, as I wrote in my response on http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0564 In fact, this so-called "fix" might tempt people to run rp-pppoe SUID-root, which is a Bad Thing, because there are probably tons of other reasons why a SUID-root rp-pppoe is dangerous. rp-pppoe 3.6 was released a while ago. It has a proper fix for SUID-ness. I recommend people use that instead of distro versions with dubious "security patches" NOTE: I have set the return path to <devnull@xxxxxxxxxxxxxxxxxx> to avoid hundreds of responses from Bugtraq readers' broken auto-responders. To reply to me, reply to <dfs@xxxxxxxxxxxxxxxxxx> Regards, David. -- fedora-legacy-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-legacy-list