OpenSSH: Security bypass A flaw has been discovered in OpenSSH which could allow a local attacker to bypass security restrictions. openssh 2007-11-01 2007-11-01 191321 remote 4.7 4.7

OpenSSH is a complete SSH protocol implementation that includes an SFTP client and server support.

Jan Pechanec discovered that OpenSSH uses a trusted X11 cookie when it cannot create an untrusted one.

An attacker could bypass the SSH client security policy and gain privileges by causing an X client to be treated as trusted.

There is no known workaround at this time.

All OpenSSH users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7"
CVE-2007-4752 jaervosz jaervosz p-y