Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 5 Oct 1999 10:44:24 +0400
From:      Igor Vinokurov <igor@rtsnet.ru>
To:        freebsd-security@freebsd.org
Subject:   Re: ssh 1.2.27 vulnerability
Message-ID:  <19991005104423.A18207@shogun.rtsnet.ru>

next in thread | raw e-mail | index | archive | help
Ollivier Robert <roberto@keltia.freenix.fr> wrote:
> > Can someone from FreeBSD Team prove to be true/deny presence
> > of a problem? And if the problem is - to recommend workaround?
>  
> AFAIK the problem is on SSH side but a workaround to this problem was
> committed in FreeBSD recently. Watch the commit logs.

Thank you.

---

From: Guido van Rooij <guido@FreeBSD.org>
Message-ID: <199909292109.OAA00913@freefall.freebsd.org>
Date: Wed, 29 Sep 1999 14:09:42 -0700 (PDT)
Subject: cvs commit: src/sys/kern uipc_usrreq.c

guido       1999/09/29 14:09:42 PDT

  Modified files:
    sys/kern             uipc_usrreq.c 
  Log:
  Do not follow symlinks when binding a unix domain socket.
  
  This fixes the ssh 1.2.27 vulnerability as reported in bugtraq.
  
  Revision  Changes    Path
  1.49      +2 -2      src/sys/kern/uipc_usrreq.c

---

-- 
Igor Vinokurov


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19991005104423.A18207>