pkgsrc/security/openssh
taca 847296952e Update openssh package to 5.1.1 (5.1p1)
Changes from OpenSSH 5.0 is huge to write here, please refer its
release note: http://www.openssh.com/txt/release-5.1.
I quote only Security section from the release note.

Security:

 * sshd(8): Avoid X11 man-in-the-middle attack on HP/UX (and possibly
   other platforms) when X11UseLocalhost=no

   When attempting to bind(2) to a port that has previously been bound
   with SO_REUSEADDR set, most operating systems check that either the
   effective user-id matches the previous bind (common on BSD-derived
   systems) or that the bind addresses do not overlap (Linux and
   Solaris).

   Some operating systems, such as HP/UX, do not perform these checks
   and are vulnerable to an X11 man-in-the-middle attack when the
   sshd_config(5) option X11UseLocalhost has been set to "no" - an
   attacker may establish a more-specific bind, which will be used in
   preference to sshd's wildcard listener.

   Modern BSD operating systems, Linux, OS X and Solaris implement the
   above checks and are not vulnerable to this attack, nor are systems
   where the X11UseLocalhost has been left at the default value of
   "yes".

   Portable OpenSSH 5.1 avoids this problem for all operating systems
   by not setting SO_REUSEADDR when X11UseLocalhost is set to no.

   This vulnerability was reported by sway2004009 AT hotmail.com.
2008-09-16 12:53:08 +00:00
..
files
patches Update openssh package to 5.1.1 (5.1p1) 2008-09-16 12:53:08 +00:00
DESCR
distinfo Update openssh package to 5.1.1 (5.1p1) 2008-09-16 12:53:08 +00:00
INSTALL
Makefile Update openssh package to 5.1.1 (5.1p1) 2008-09-16 12:53:08 +00:00
MESSAGE.Interix
MESSAGE.pam
MESSAGE.urandom
options.mk Update openssh package to 5.1.1 (5.1p1) 2008-09-16 12:53:08 +00:00
PLIST Update openssh package to 5.1.1 (5.1p1) 2008-09-16 12:53:08 +00:00
PLIST.pam
PLIST.prng