Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160114223207.GB30647@localhost.localdomain>
Date: Thu, 14 Jan 2016 14:32:07 -0800
From: Qualys Security Advisory <qsa@...lys.com>
To: Jan Schaumann <jschauma@...meister.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - Roaming through the
 OpenSSH client: CVE-2016-0777 and CVE-2016-0778

On Thu, Jan 14, 2016 at 01:11:29PM -0500, Jan Schaumann wrote:
> Why is version 5.3 not affected?

The information leak is in resend_bytes() ["if (out_start < out_last)"
should be "if (out_start <= out_last)"], but in OpenSSH 5.3, there is no
call to resend_bytes(), at all (roaming_client.c does not even exist).

With best regards,

-- 
the Qualys Security Advisory team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.