Displaying 5 results from an estimated 5 matches for "unexploitable".
Did you mean:
exploitable
2014 Feb 28
5
Call for testing: OpenSSH 6.6
...92
* sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace
sandbox modes, as it is reachable if the connection is terminated
during the pre-auth phase.
* ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum
parsing. Minimum key length checks render this bug unexploitable to
compromise SSH 1 sessions.
* sshd_config(5): clarify behaviour of a keyword that appears in
multiple matching Match blocks. bz#2184
* ssh(1): avoid unnecessary hostname lookups when canonicalisation is
disabled. bz#2205
* sshd(8): avoid sandbox violation crashes in GSSAPI code by...
2001 Nov 19
1
OpenSSH 3.0.1
...y allow an attacker to authenticate
if -- and only if -- the administrator has enabled KerberosV.
By default, OpenSSH KerberosV support only becomes active
after KerberosV has been properly configured.
An excessive memory clearing bug (which we believe to be
unexploitable) also exists, but since this may cause daemon
crashes, we are providing a fix as well.
Various other non-critical fixes (~& support and more).
OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
Kevin Steves, Damien Miller and Ben Lindstrom.
2014 Mar 15
0
Announce: OpenSSH 6.6 released
...92
* sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace
sandbox modes, as it is reachable if the connection is terminated
during the pre-auth phase.
* ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum
parsing. Minimum key length checks render this bug unexploitable to
compromise SSH 1 sessions.
* sshd_config(5): clarify behaviour of a keyword that appears in
multiple matching Match blocks. bz#2184
* ssh(1): avoid unnecessary hostname lookups when canonicalisation is
disabled. bz#2205
* sshd(8): avoid sandbox violation crashes in GSSAPI code by...
2014 Mar 15
0
Announce: OpenSSH 6.6 released
...92
* sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace
sandbox modes, as it is reachable if the connection is terminated
during the pre-auth phase.
* ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum
parsing. Minimum key length checks render this bug unexploitable to
compromise SSH 1 sessions.
* sshd_config(5): clarify behaviour of a keyword that appears in
multiple matching Match blocks. bz#2184
* ssh(1): avoid unnecessary hostname lookups when canonicalisation is
disabled. bz#2205
* sshd(8): avoid sandbox violation crashes in GSSAPI code by...
2009 Apr 01
10
FOR IMMEDIATE RELEASE: NEW CHANNEL DRIVER FOR ASTERISK RELEASED TODAY
* NEW CHANNEL DRIVER FOR ASTERISK 1.6 AND VOXSWITCH 3 ADDS AUDIO AND
VIDEO TO MICROBLOGGING!
In a surprising move, Digium in partnership with Edvina today released
a new channel driver for Asterisk, chan_tweet. The driver connects
seamlessly to several microblogging platforms, including Twitter,
Facebook, Laconi.ca/Identi.ca and GSM text/SMS. The main feature of
this new module is to