version 1.2, 2008/03/31 01:40:47 |
version 1.3, 2008/04/03 06:00:14 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="002_openssh2"></a> |
|
<font color="#009000"><strong>002: SECURITY FIX: April 3, 2008</strong></font> <i>All architectures</i><br> |
|
Avoid possible hijacking of X11-forwarded connections with sshd(8) |
|
by refusing to listen on a port unless all address families bind |
|
successfully.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/002_openssh2.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="001_openssh"></a> |
<li><a name="001_openssh"></a> |
<font color="#009000"><strong>001: SECURITY FIX: March 30, 2008</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>001: SECURITY FIX: March 30, 2008</strong></font> <i>All architectures</i><br> |
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em> |
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em> |