Date: Tue, 5 Oct 1999 10:44:24 +0400 From: Igor Vinokurov <igor@rtsnet.ru> To: freebsd-security@freebsd.org Subject: Re: ssh 1.2.27 vulnerability Message-ID: <19991005104423.A18207@shogun.rtsnet.ru>
next in thread | raw e-mail | index | archive | help
Ollivier Robert <roberto@keltia.freenix.fr> wrote: > > Can someone from FreeBSD Team prove to be true/deny presence > > of a problem? And if the problem is - to recommend workaround? > > AFAIK the problem is on SSH side but a workaround to this problem was > committed in FreeBSD recently. Watch the commit logs. Thank you. --- From: Guido van Rooij <guido@FreeBSD.org> Message-ID: <199909292109.OAA00913@freefall.freebsd.org> Date: Wed, 29 Sep 1999 14:09:42 -0700 (PDT) Subject: cvs commit: src/sys/kern uipc_usrreq.c guido 1999/09/29 14:09:42 PDT Modified files: sys/kern uipc_usrreq.c Log: Do not follow symlinks when binding a unix domain socket. This fixes the ssh 1.2.27 vulnerability as reported in bugtraq. Revision Changes Path 1.49 +2 -2 src/sys/kern/uipc_usrreq.c --- -- Igor Vinokurov To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19991005104423.A18207>