Damien Miller 9e96b41682 Fix weakness in seccomp-bpf sandbox arg inspection
Syscall arguments are passed via an array of 64-bit values in struct
seccomp_data, but we were only inspecting the bottom 32 bits and not
even those correctly for BE systems.

Fortunately, the only case argument inspection was used was in the
socketcall filtering so using this for sandbox escape seems
impossible.

ok dtucker
2017-03-14 12:41:53 +11:00
2016-12-19 15:59:41 +11:00
2017-03-12 10:50:54 +11:00
2016-10-13 18:55:25 +11:00
2016-09-22 03:14:59 +10:00
2016-08-03 15:38:43 +10:00
2016-05-02 20:35:04 +10:00
2015-01-20 09:14:16 +11:00
2016-03-08 06:20:35 +11:00
2017-01-30 12:04:10 +11:00
2017-02-04 10:09:43 +11:00
2015-10-25 11:42:04 +11:00
2016-05-19 17:48:34 +10:00
2016-11-30 19:44:01 +11:00
2016-11-30 19:44:01 +11:00
2017-03-10 13:40:18 +11:00
2016-07-22 13:36:40 +10:00
2016-08-14 11:19:14 +10:00
2016-12-16 13:12:18 +11:00
2016-08-14 11:19:14 +10:00
2015-12-07 12:38:58 +11:00
2015-12-07 12:38:58 +11:00
2016-11-29 16:48:02 +11:00
2015-01-09 00:17:12 +11:00
2015-09-16 17:52:07 +10:00
2015-01-15 02:28:00 +11:00
2016-10-21 06:55:58 +11:00
2016-03-08 06:20:35 +11:00
2016-03-08 06:20:35 +11:00
2016-08-29 11:20:28 +10:00
2017-02-03 14:23:24 +11:00
2016-10-28 13:38:19 +11:00
2016-10-28 13:38:19 +11:00
2016-08-09 09:06:52 +10:00
2016-08-09 09:06:52 +10:00
2017-03-10 16:02:46 +11:00
2016-10-01 02:45:10 +10:00
2017-02-04 10:08:15 +11:00
2015-05-27 13:47:19 +10:00
2015-01-26 23:58:53 +11:00
2015-01-20 09:13:01 +11:00
2016-10-15 05:51:12 +11:00
2016-12-16 13:12:18 +11:00
2016-05-02 20:39:32 +10:00
2015-05-08 13:32:55 +10:00
2017-03-10 15:23:17 +11:00
2014-12-22 09:32:29 +11:00
2015-05-10 11:55:48 +10:00
2015-08-21 13:43:25 +10:00
2015-05-08 16:46:01 +10:00
2015-02-17 09:32:31 +11:00
2015-05-10 11:38:04 +10:00
2016-09-12 13:46:29 +10:00
2015-05-22 20:02:17 +10:00
2015-03-27 12:00:47 +11:00
2017-03-10 15:35:39 +11:00
2015-02-17 09:32:31 +11:00
2017-03-10 15:35:39 +11:00
2016-09-29 08:18:39 +10:00
2016-05-02 20:35:04 +10:00
2015-01-27 00:00:57 +11:00
2015-12-07 12:38:58 +11:00
2016-05-02 20:39:32 +10:00
2016-05-02 20:39:32 +10:00
2016-05-02 20:39:32 +10:00
2015-01-20 09:19:39 +11:00
2015-01-27 00:00:57 +11:00
2015-12-07 12:38:58 +11:00
2015-01-20 09:19:39 +11:00
2016-09-12 13:46:29 +10:00
2016-09-12 13:46:29 +10:00
2016-05-02 20:35:05 +10:00
2016-09-13 09:33:24 +10:00
2017-03-12 10:50:18 +11:00
2016-01-07 20:13:32 +11:00
2017-03-10 15:25:11 +11:00
2016-07-15 20:54:55 +10:00
2015-12-15 13:59:12 +11:00
2016-10-28 14:26:58 +11:00
2016-07-08 13:50:03 +10:00
2017-03-10 15:35:40 +11:00
2017-02-04 10:08:15 +11:00
2016-11-30 19:44:01 +11:00
2016-11-30 19:44:01 +11:00
2016-08-11 11:42:48 +10:00
2016-09-12 13:46:29 +10:00
2016-03-04 15:12:17 +11:00
2016-08-14 11:19:14 +10:00
2016-09-29 03:11:32 +10:00
2017-02-04 10:09:43 +11:00
2016-09-29 03:11:32 +10:00
2015-01-15 21:39:14 +11:00
2015-01-15 21:39:14 +11:00
2017-01-30 11:07:44 +11:00
2016-09-29 03:11:32 +10:00
2016-01-27 16:54:10 +11:00
2016-10-01 02:45:10 +10:00
2015-07-15 15:36:21 +10:00
2017-03-12 10:50:19 +11:00
2017-02-04 10:08:15 +11:00
2017-01-16 09:08:32 +11:00
2016-07-08 13:46:59 +10:00
2015-01-15 02:22:18 +11:00
2016-10-21 06:55:58 +11:00
2016-05-19 17:48:36 +10:00
2016-05-03 20:29:14 +10:00
2016-05-04 00:55:21 +10:00
2015-01-30 12:17:07 +11:00
2015-07-17 13:36:29 +10:00
2017-03-10 15:35:39 +11:00
2016-07-15 14:20:10 +10:00
2016-12-19 15:59:41 +11:00
2015-12-11 13:23:14 +11:00
2015-03-23 17:08:12 +11:00
2016-09-12 13:46:29 +10:00
2016-07-17 14:21:09 +10:00
2017-03-10 15:35:39 +11:00
2016-11-30 19:44:01 +11:00
2017-02-03 14:23:24 +11:00
2016-08-14 11:19:14 +10:00
2016-11-30 19:44:01 +11:00
2016-08-14 11:19:14 +10:00
2017-01-04 13:23:04 +11:00
2016-09-12 13:46:29 +10:00
2015-01-15 02:22:18 +11:00
2015-01-15 02:22:18 +11:00
2016-02-16 10:44:00 +11:00
2014-12-11 19:17:24 +11:00
2016-09-12 13:46:29 +10:00
2016-07-17 14:21:09 +10:00
2017-02-17 14:52:24 +11:00
2016-05-19 17:48:34 +10:00
2016-05-19 17:48:34 +10:00
2016-05-19 17:48:34 +10:00
2015-02-24 06:30:29 +11:00
2016-02-23 12:44:19 +11:00
2017-02-28 17:10:41 +11:00
2015-04-01 10:00:27 +11:00
2016-02-16 10:44:00 +11:00
2016-11-30 19:44:25 +11:00
2017-01-04 13:23:04 +11:00
2016-04-21 16:30:11 +10:00
2016-04-21 16:30:11 +10:00
2016-04-21 16:30:11 +10:00
2016-06-24 13:35:28 +10:00
2017-03-10 15:35:39 +11:00
2015-11-09 14:25:41 +11:00
2017-03-10 15:35:39 +11:00
2016-02-18 09:24:40 +11:00
2016-02-16 10:44:00 +11:00
2015-12-11 13:23:14 +11:00
2016-02-16 10:44:00 +11:00
2016-11-06 16:47:43 +11:00
2015-01-15 21:39:14 +11:00
2016-09-14 10:51:24 +10:00
2016-07-17 14:21:09 +10:00
2017-03-10 15:35:39 +11:00
2015-12-18 14:49:32 +11:00
2016-01-13 10:48:11 +11:00
2016-05-02 20:35:04 +10:00
2016-11-29 16:48:02 +11:00
2016-11-29 16:48:02 +11:00
2017-03-10 15:35:39 +11:00
2017-03-12 10:50:19 +11:00
2017-03-10 15:25:11 +11:00
2015-11-16 11:31:39 +11:00
2016-08-23 13:28:30 +10:00
2017-02-04 10:08:15 +11:00
2017-02-03 14:23:24 +11:00
2017-02-28 17:10:41 +11:00
2015-09-16 17:52:09 +10:00
2015-01-30 12:18:59 +11:00
2017-03-10 15:35:39 +11:00
2017-03-10 15:35:39 +11:00
2016-01-07 20:13:31 +11:00
2016-11-29 16:51:27 +11:00
2016-11-29 16:51:27 +11:00
2016-09-29 03:19:23 +10:00
2016-05-19 17:48:34 +10:00
2016-05-03 20:04:42 +10:00
2017-02-19 11:18:42 +11:00
2015-04-29 18:15:24 +10:00
2016-12-19 15:59:40 +11:00
2016-02-16 10:44:00 +11:00

See https://www.openssh.com/releasenotes.html#7.4p1 for the release notes.

Please read https://www.openssh.com/report.html for bug reporting
instructions and note that we do not use Github for bug reporting or
patch/pull-request management.

- A Japanese translation of this document and of the release notes is
- available at http://www.unixuser.org/~haruyama/security/openssh/index.html
- Thanks to HARUYAMA Seigo <haruyama@unixuser.org>

This is the port of OpenBSD's excellent OpenSSH[0] to Linux and other
Unices.

OpenSSH is based on the last free version of Tatu Ylonen's sample
implementation with all patent-encumbered algorithms removed (to
external libraries), all known security bugs fixed, new features
reintroduced and many other clean-ups.  OpenSSH has been created by
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo de Raadt,
and Dug Song. It has a homepage at https://www.openssh.com/

This port consists of the re-introduction of autoconf support, PAM
support, EGD[1]/PRNGD[2] support and replacements for OpenBSD library
functions that are (regrettably) absent from other unices. This port
has been best tested on AIX, Cygwin, HP-UX, Linux, MacOS/X,
NetBSD, OpenBSD, OpenServer, Solaris, Unicos, and UnixWare.

This version actively tracks changes in the OpenBSD CVS repository.

The PAM support is now more functional than the popular packages of
commercial ssh-1.2.x. It checks "account" and "session" modules for
all logins, not just when using password authentication.

OpenSSH depends on Zlib[3], OpenSSL[4] and optionally PAM[5].

There is now several mailing lists for this port of OpenSSH. Please
refer to https://www.openssh.com/list.html for details on how to join.

Please send bug reports and patches to the mailing list
openssh-unix-dev@mindrot.org. The list is open to posting by unsubscribed
users.  Code contribution are welcomed, but please follow the OpenBSD
style guidelines[6].

Please refer to the INSTALL document for information on how to install
OpenSSH on your system.

Damien Miller <djm@mindrot.org>

Miscellania -

This version of OpenSSH is based upon code retrieved from the OpenBSD
CVS repository which in turn was based on the last free sample
implementation released by Tatu Ylonen.

References -

[0] https://www.openssh.com/
[1] http://www.lothar.com/tech/crypto/
[2] http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html
[3] http://www.gzip.org/zlib/
[4] http://www.openssl.org/
[5] http://www.openpam.org
    http://www.kernel.org/pub/linux/libs/pam/
    (PAM also is standard on Solaris and HP-UX 11)
[6] http://man.openbsd.org/style.9
Description
Portable OpenSSH, all Win32-OpenSSH releases and wiki are managed at https://github.com/powershell/Win32-OpenSSH
Readme 87 MiB
Languages
C 78.3%
Shell 6.7%
PowerShell 5.3%
Roff 4.9%
M4 2.4%
Other 2.4%