| Summary: | FreeBSD 11.x vulnerability in OpenSSH | ||
|---|---|---|---|
| Product: | Base System | Reporter: | Dani I. <i.dani> |
| Component: | bin | Assignee: | Security Team <secteam> |
| Status: | Closed FIXED | ||
| Severity: | Affects Many People | CC: | arnaud, des, eadler, emaste, freebsd, gordon, remko, secteam, sigsys |
| Priority: | --- | Keywords: | needs-qa, security |
| Version: | 11.3-RELEASE | Flags: | koobs:
mfc-stable11?
|
| Hardware: | Any | ||
| OS: | Any | ||
| URL: | https://nvd.nist.gov/vuln/detail/CVE-2017-15906 | ||
|
Description
Dani I.
2018-12-05 14:27:23 UTC
See Also: http://lists.nycbug.org/pipermail/talk/2017-December/017442.html where eadler apparently looped secteam in HEAD received the OpenSSH 7.6p1 update in base r333389 so stable/12 has it bump.. ... A commit references this bug: Author: emaste Date: Fri Dec 13 20:45:46 UTC 2019 New revision: 355731 URL: https://svnweb.freebsd.org/changeset/base/355731 Log: sftp: disallow creation (of empty files) in read-only mode Direct commit to stable/11; already fixed in newer OpenSSH in 12 and later. PR: 233801 Reported by: Dani Obtained from: OpenBSD 1.111 Security: CVE-2017-15906 Changes: stable/11/crypto/openssh/sftp-server.c |