[Bug 2143] X11 forwarding for ipv4 is broken when ipv6 is disabled on the loopback interface

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Thu Nov 9 00:52:53 AEDT 2017


https://bugzilla.mindrot.org/show_bug.cgi?id=2143

Jakub Jelen <jjelen at redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |jjelen at redhat.com

--- Comment #6 from Jakub Jelen <jjelen at redhat.com> ---
ping. Is there any update on this?

To my understanding and testing, the patch provided by Petr does NOT
expose the linked CVE, because the attack really depends on the
ignoring EADDRINUSE errno, which was the problem of implementation
before OpenSSH 5.0 but not of this patch.

I believe that it is not a priority for you, but on some systems with
disabled IPv6 this issue is pretty annoying. I can see in this bug that
there are at least three people who believe it is a bug and that this
patch is solving the problem without introducing any regression in
security.

So is there any chance to have this patch reviewed/accepted?

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list