[Bug 2143] X11 forwarding for ipv4 is broken when ipv6 is disabled on the loopback interface

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Wed Aug 30 06:27:17 AEST 2017


https://bugzilla.mindrot.org/show_bug.cgi?id=2143

Petr Cerny [:hrosik] <pcerny at suse.cz> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |pcerny at suse.cz

--- Comment #5 from Petr Cerny [:hrosik] <pcerny at suse.cz> ---
Created attachment 3044
  --> https://bugzilla.mindrot.org/attachment.cgi?id=3044&action=edit
generally skip throwing away opened sockets on EADDRNOTAVAIL

I'm suppose the same could (in the future) happen for IPv4 (or other
protocols), it might be better not to limit it to IPv6.

Darren, do you have any concerns about this sort of limiting? AFAIU,
the only way CVE-2008-1483 could creep back in is that someone enables
disabled protocol and starts listening on the same port that is already
used (with the address family that was available at the moment the
connection was established).

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list