|
|
Subscribe / Log in / New account

Privilege Separated OpenSSH 3.3

Package(s):openssh CVE #(s):
Created:June 24, 2002 Updated:June 26, 2002
Description: The release of OpenSSH 3.3 includes greatly improved support for privilege separation, which is now enabled by default. The process charged with talking to the network; now runs without privilege. Upgrading is strongly recommended (see below).

Previously any corruption in the sshd could lead to an immediate remote root compromise if it happened before authentication, and to local root compromise if it happend after authentication. Privilege Separation will make such compromise very difficult if not impossible.

Or to put it into the words of Theo de Raadt: "Privilege Separation will one day save our asses." So, turn it on now.

When upgrading with a 2.2.x kernel, disabling compression is recommended to avoid this bug which causes sshd to log a fatal mmap argument error then crash.

Update: According to this OpenSSH Security Advisory OpenSSH 3.3 has a serious privilege escalation vulnerable. Please see the new vulnerability report for more information and a list of available alerts.

Alerts:
Conectiva CLA-2002:500 openssh 2002-06-25
SuSE SuSE-SA:2002:023 openssh 2002-06-25
Debian DSA-134-2 ssh 2002-06-25
EnGarde ESA-20020625-015 openssh 2002-06-25
Mandrake MDKSA-2002:040 openssh 2002-06-24
Debian DSA-134-1 ssh 2002-06-24
Eridani ERISA-2002:025 openssh 2002-06-23

to post comments

Privilege Separated OpenSSH 3.3

Posted Jun 27, 2002 8:26 UTC (Thu) by beejaybee (guest, #1581) [Link]

One noticeable omission from this list - Red Hat

C'mon guys I think we need this upgrade (together with the fixes in 3.4)

Brian Beesley


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds