version 1.17, 2008/03/31 01:40:47 |
version 1.18, 2008/04/03 06:00:14 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="016_openssh2"></a> |
|
<font color="#009000"><strong>016: SECURITY FIX: April 3, 2008</strong></font> <i>All architectures</i><br> |
|
Avoid possible hijacking of X11-forwarded connections with sshd(8) |
|
by refusing to listen on a port unless all address families bind |
|
successfully.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/016_openssh2.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="015_openssh"></a> |
<li><a name="015_openssh"></a> |
<font color="#009000"><strong>015: SECURITY FIX: March 30, 2008</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>015: SECURITY FIX: March 30, 2008</strong></font> <i>All architectures</i><br> |
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em> |
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em> |