Re: debian openssh issue with openssl 1.1.1d

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Oct 08, 2019 at 05:23:56AM -0400, Michael Richardson wrote:
> Salvatore Bonaccorso <carnil@xxxxxxxxxx> wrote:
>     > -------------------------------------------------------------------------
>     > Debian Security Advisory DSA-4539-2                   security@xxxxxxxxxx
>     > https://www.debian.org/security/                     Salvatore Bonaccorso
>     > October 07, 2019                      https://www.debian.org/security/faq
>     > -------------------------------------------------------------------------
> 
>     > Package        : openssh
>     > Debian Bug     : 941663
> 
>     > A change introduced in openssl 1.1.1d (which got released as DSA 4539-1)
>     > requires sandboxing features which are not available in Linux kernels
>     > before 3.19, resulting in OpenSSH rejecting connection attempts if
> 
> I've gone through the changelog for 1.1.1d, but I can't figure out what
> 1.1.1d would have changed that would have caused this.

The RNG uses sysV shm to convey to other processes that /dev/[u]random has been
properly seeded, under some configurations/kernel versions.

-Ben



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux