A flaw has been discovered in OpenSSH which could allow a local attacker to bypass security restrictions.
|Package||net-misc/openssh on all architectures|
|Affected versions||< 4.7|
|Unaffected versions||>= 4.7|
OpenSSH is a complete SSH protocol implementation that includes an SFTP client and server support.
Jan Pechanec discovered that OpenSSH uses a trusted X11 cookie when it cannot create an untrusted one.
An attacker could bypass the SSH client security policy and gain privileges by causing an X client to be treated as trusted.
There is no known workaround at this time.
All OpenSSH users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7"
November 01, 2007
November 01, 2007: 01