Re: Request to Update OpenSSH Version in Git due to Security Vulnerabilities (CVE-2006-5051, CVE-2024-6387

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2024-07-10 19:10, Junio C Hamano wrote:
Johannes Schindelin <Johannes.Schindelin@xxxxxx> writes:

The crucial part is the `sshd` part. Git for Windows does distribute the
`sshd.exe` binary, but it is in no way used by default, nor is there
support how to set it up to run an SSH server.

Git for Windows is therefore not affected by this vulnerability, and
therefore it is not crucial to get a new version out as quickly as
possible. See also my assessment at
https://github.com/git-for-windows/git/issues/5031#issuecomment-2199722969

I think I've seen in the past another inquiry about vulnerability
in OpenSSH, which turned out to be irrelevant in the context of Git
for Windows for this exact reason (i.e. "sshd" is problematic but
"ssh" is OK).

Would it make future confusion like this less likely if you stopped
shipping the sshd and ship only the ssh client?

Not shipping sshd.exe would make sense regardless of the associated security issues, because it would prevent accidental enabling of SSH access. Also, if someone wants to make SSHing into their Windows machine possible, I'm pretty sure they won't do that by installing Git for Windows and using the shipped
sshd.exe, but by some other means.

In other words, not shipping sshd.exe would not only reduce the likeness of hitting some security issues, but would also prevent accidental enabling of
SSH access on a Windows machine.




[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux