version 1.392, 2002/05/09 14:40:41 |
version 1.393, 2002/05/22 22:32:29 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=sshbsdauth></a> |
|
<li><font color=#009000><strong>004: SECURITY FIX: May 22, 2002</strong></font><br> |
|
Under certain conditions, on systems using YP with netgroups in the |
|
password database, it is possible that |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&sektion=8">sshd(8)</a> |
|
does ACL checks for the requested user name but uses the password |
|
database entry of a different user for authentication. This means |
|
that denied users might authenticate successfully while permitted |
|
users could be locked out.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/004_sshbsdauth.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=fdalloc2></a> |
<a name=fdalloc2></a> |
<li><font color=#009000><strong>003: SECURITY FIX: May 8, 2002</strong></font><br> |
<li><font color=#009000><strong>003: SECURITY FIX: May 8, 2002</strong></font><br> |
A race condition exists where an attacker could fill the file descriptor |
A race condition exists where an attacker could fill the file descriptor |