version 1.16, 2008/03/09 21:05:00 |
version 1.17, 2008/03/31 01:40:47 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="010_openssh"></a> |
|
<font color="#009000"><strong>010: SECURITY FIX: March 30, 2008</strong></font> <i>All architectures</i><br> |
|
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em> |
|
directive was in effect, allowing users with write access to this file to |
|
execute arbitrary commands. This behaviour was documented, but was an unsafe |
|
default and an extra hassle for administrators.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/010_openssh.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="009_ppp"></a> |
<li><a name="009_ppp"></a> |
<font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font> <i>All architectures</i><br> |
Buffer overflow in ppp command prompt parsing.<br> |
Buffer overflow in ppp command prompt parsing.<br> |