From: Shachar S. <sh...@sh...> - 2014-09-25 14:42:29
|
On 25/09/14 17:37, Jiri Horky wrote: > Hi, > > there is a bug causing segmentation fault in the previous patch, if the > supplied username was not find using getpwnam. Attached is the fixed > version. Before anything else, thank you for your patch. I am a bit swamped right now, so it will take me a little while to get around to looking into it. Thanks again, Shachar > Regards > Jiri Horky > > On 07/30/2014 09:09 PM, Jiri Horky wrote: >> Hi, >> >> I think it is a sane default to add supplementary user groups of a >> specified user to the effective groups, so the executed command would >> have privileges comparable to the user. The attached patch enables this >> behavior. It also adds -G argument which can disable it should somebody >> restrict privileges even more. >> >> Regards >> Jiri Horky > > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk > > > _______________________________________________ > Privbind-devel mailing list > Pri...@li... > https://lists.sourceforge.net/lists/listinfo/privbind-devel |