OpenSSH Security Advisory: buffer.adv
Pekka Savola
pekkas at netcore.fi
Thu Sep 18 21:32:03 EST 2003
Seem to have merged two hours ago.
Some of those are just cleanups though, e.g. the deattack.c change (at
least, I fail to see how that would change the functional behaviour).
On Thu, 18 Sep 2003, Dries Schellekens wrote:
> On Wed, 17 Sep 2003, Dries Schellekens wrote:
>
> > Will the 4 extra fixes by Solar Designer be included as well?
> >
> > >From the Owl Changelog
> > 2003/09/17 Package: openssh
> > SECURITY FIX Severity: medium, remote, active
> >
> > Multiple memory management errors have been discovered in OpenSSH, and
> > this update corrects 6 such real or potential errors based on an
> > exhaustive review of the OpenSSH source code for uses of *realloc()
> > functions. At this time, it is uncertain whether and which of these bugs
> > are exploitable. If exploits are possible, due to privilege separation,
> > the worst direct impact should be limited to arbitrary code execution
> > under the sshd pseudo-user account restricted within the chroot jail
> > /var/empty, or under the logged in user account. Reference:
> > http://www.openssh.com/txt/buffer.adv
>
> So is there no urgent need to include these fixes?
>
>
> Cheers,
>
> Dries
> --
> Dries Schellekens
> email: gwyllion at ulyssis.org
>
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> http://www.mindrot.org/mailman/listinfo/openssh-unix-dev
>
--
Pekka Savola "You each name yourselves king, yet the
Netcore Oy kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
More information about the openssh-unix-dev
mailing list