similar to: Announce: OpenSSH 5.8 released

Displaying 20 results from an estimated 800 matches similar to: "Announce: OpenSSH 5.8 released"

2011 Mar 31
1
[v1 PATCH 0/1] Review request for a memory leak fix for openssh
---------------------------------------------------- Summary: fix a memory leak for Openssh ---------------------------------------------------- Upstream Project Name: OpenSSH Upstream Project URL: anoncvs at anoncvs.mindrot.org:/cvs Applies to: anoncvs at anoncvs.mindrot.org:/cvs Brief Description: the memory which is allocated by matchpathcon should be freed after it is used Will Submit to:
2011 Jan 27
6
[Bug 1851] New: ssh_selinux_setfscreatecon segfaults if SELinux support is compiled in but is disabled at run-time
https://bugzilla.mindrot.org/show_bug.cgi?id=1851 Summary: ssh_selinux_setfscreatecon segfaults if SELinux support is compiled in but is disabled at run-time Product: Portable OpenSSH Version: 5.7p1 Platform: All OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: ssh
2008 Mar 21
1
ChrootDirectory fails if compiled with SELinux support (whether or not using SELinux)
Hi, (please CC me as I'm not subscribed to the list) If compiled with SELinux support, OpenSSH 4.8 current cvs fails for accounts where the new ChrootDirectory option is active : debug1: PAM: establishing credentials debug3: PAM: opening session debug2: User child is on pid 1695 debug3: mm_request_receive entering debug1: PAM: establishing credentials debug3: safely_chroot: checking
2011 Feb 11
0
openssh-5.8p1 does not compille with --with-selinux
Hi there is unpaired brackets in port_linux_compat.c in ssh_selinux_setfscreatecon if (path == NULL) setfscreatecon(NULL); return; } -- JFCh <jchadima at redhat.com>
2011 May 20
0
[patch] the memory which is allocated by matchpathcon should be freed after it is useless
the memory which is allocated by matchpathcon should be freed after it is useless Signed-off-by: Roy Li <rongqing.li at windriver.com> --- openbsd-compat/port-linux.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/openbsd-compat/port-linux.c +++ b/openbsd-compat/port-linux.c @@ -217,8 +217,10 @@ ssh_selinux_setfscreatecon(const char *p setfscreatecon(NULL);
2011 Mar 31
0
[v1 PATCH 1/1] Free memory
The memory which is allocated by matchpathcon should be freed after it is used Signed-off-by: Roy Li <rongqing.li at windriver.com> --- openbsd-compat/port-linux.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/openbsd-compat/port-linux.c +++ b/openbsd-compat/port-linux.c @@ -217,8 +217,10 @@ ssh_selinux_setfscreatecon(const char *p setfscreatecon(NULL); return;
2001 Oct 26
5
New password echoes on Sol8
I tried replacing readpassphrase() for v2.9.9p2 on Sol8 with a different version that just calls getpassphrase(). It appears to solve the echo problem when the user tries to login in interactive mode and needs to change their password. Can anyone else try this with v2.9.9p2 on Solaris? Be sure to add: #define HAVE_GETPASSPHRASE ... to config.h when compiling (since it's not a configurable
2011 Feb 04
0
OpenSSH security advisory: legacy certificate signing in 5.6/5.7
OpenSSH Security Advisory: legacy-certs.adv This document may be found at: http://www.openssh.com/txt/legacy-cert.adv 1. Vulnerability Legacy certificates generated by OpenSSH might contain data from the stack thus leaking confidential information. 2. Affected configurations OpenSSH 5.6 and OpenSSH 5.7 only when generating legacy certificates. These must be
2015 Aug 21
0
Announce: OpenSSH 7.1 released
OpenSSH 7.1 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. OpenSSH also includes transitional support for the legacy SSH 1.3 and 1.5 protocols that may be enabled at compile-time. Once again, we would like to thank the OpenSSH community
2011 Feb 04
0
OpenSSH security advisory: legacy certificate signing in 5.6/5.7
OpenSSH Security Advisory: legacy-certs.adv This document may be found at: http://www.openssh.com/txt/legacy-cert.adv 1. Vulnerability Legacy certificates generated by OpenSSH might contain data from the stack thus leaking confidential information. 2. Affected configurations OpenSSH 5.6 and OpenSSH 5.7 only when generating legacy certificates. These must be
2015 Aug 21
4
Announce: OpenSSH 7.1 released
OpenSSH 7.1 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. OpenSSH also includes transitional support for the legacy SSH 1.3 and 1.5 protocols that may be enabled at compile-time. Once again, we would like to thank the OpenSSH community
2009 Apr 13
3
duration of rfc2833 generated dtmf
Hi. I have a SIP provider which wants RFC2833 for the dtmfmode, however I would like to increase the duration of the tone, its pretty short and some IVR's are unhappy or don't detect it. I did poke around, but it looks like when RFC2833 is used, it actually generates rtp packets of some sort, so I have no idea how to increase that duration. Any assistance would be appreciated. -- Your
2011 May 18
1
Bug found in openssh 5.8p1 source
I was compiling the 5.8p1 source for CentOS 5.6 by installing the CentOS 5.6 source RPM for 4.3p2 and stealing the configure command they use to ensure I had all the same bits. I needed this to chroot some SFTP users and need the "Match" operator. The configure went well (once I had satisfied all the requirements). Upon compiling, however, I hit a syntax error in one of the files. In
2008 May 25
1
OpenSSH + chroot + SELinux = broke
Hello, First, a big thank you to the OpenSSH devs. _ /Problem Summary:/ _ Chroot and SELinux don't get along. This affects both the new (official) ChrootDirectory feature, as well as the older (3rd party) patch at http://chrootssh.sourceforge.net/. _ /History and repro:/ _ On March 21, 2008, Alexandre Rossi posted to this list with the subject: "*ChrootDirectory
2011 Jan 24
1
Announce: OpenSSH 5.7 released
OpenSSH 5.7 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches,
2020 Sep 30
3
Bind9 issue
Yesterday I had an issue with Samba v 4.13.0. Went to backup and discovered backup computer has a drive failure and backup is gone. Only resort is to rebuild the DC. I cannot figure out why bind9 will not "host -t SRV _ldap._ tcp.ad.dtntwk.work." or "host -t SRV _kerberos._udp.ad.dtntwk.work." root at dc1:~# host -t SRV _ldap._tcp.subdom.example.com. >
1997 Aug 28
2
Win 95 Policy Files
> On another note - in order to get roaming profiles to work on W95 with > no NT server, I had to do some horrible things to the registry, which > I'm not sure is (or was ever) necessary - it worked so I kept it. > I was able to get this working ( I think ) by enableing the user profiles in the password applet in the control panel and then adding the key
2007 Feb 15
2
What is/provides php-pear(PEAR)
I am running up against a less than helpful error message when trying to install php-pear-DB (why people cannot content themselves with all lowercase packages names escapes me, but that is a rant for another time and place). After enableing centos-plus and adding includepkgs=php-pear-DB I get this: # yum install php-pear-DB Setting up Install Process Setting up repositories Reading repository
2005 Apr 16
3
Problem with openssh-4.0p1 and tcp wrappers on RH7.2(Scyld)
I have tried to update openssh-3.1p1 of our system that uses RH7.2 (Scyld). I is pretty much a standard Redhat 7.2 install with openssl-0.9.6b, zlib-1.1.4 etc. I have gotten openssh to work after some initial issues, but I still have not been able to get openssh/sshd to work with tcp-wrappers. I have in hosts.deny ALL: ALL: and in hosts.allow ALL: localhost, 127.0.0.1, 192.168.1. and still I
2011 Feb 17
24
[Bug 1213] ssh-keyscan exits in mid-way
https://bugzilla.mindrot.org/show_bug.cgi?id=1213 Andreas Kotes <count-mindrot at flatline.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |count-mindrot at flatline.de Severity|normal |major --- Comment #6 from