HP-UX Secure Shell A.05.10.045, A.05.10.046, and A.05.10.047 Release Notes
Table 1-2 Defects Fixed in OpenSSH5.1p1 (continued)
Defect FixDefect Identifier
ssh(1) will now exit with a non-zero exit status if ExitOnForwardFailure was set and forwardings were disabled
due to a failed host key check.
Background Information: Since OpenSSH5.1, if host key changes, ssh adds the code to deal with the situation that
ExitOnForwardFailure was set and forwarding was disabled.
sshd(8) has been audited to eliminate fd leaks and calls to fatal() in conditions of file descriptor exhaustion.
Background Information: Since OpenSSH5.1, audit sshd ensures that it does not leak fds on error paths, and make
it fail gracefully on out-of-fd conditions, sending channel errors instead of exiting with fatal().
OpenSSH 5.1p1 also includes fixes for some security vulnerabilities.
For more information on these defect fixes, see the Bugzilla Website at: http://bugzilla.mindrot.org.
Defects Fixed in HP-UX Secure Shell A.05.10
HP-UX Secure Shell versions A.05.10. include the following defect fixes:
No QXCR Internal-sftp does not show user or group names in the chroot
environment. Update the ssh_chroot_setup.sh to reserve the original
permissions and ownership while copying directories to the chrooted
directory. Also copy the /opt/ssh/utils/sftponly file and some
other library files used in 64bits to chrooted directory.
QXCR1000888398 Upgrading from SecureShell 4.xx.xx to SecureShell 5.00.xx without making
configuration changes to the sshd_config file, breaks the jail for existing
chrooted users. Enable the old chroot function to make it co-exist with
the new one. The newly added server configure parameter,
OldChrootBehaviour, is removed. Chroot function is switched upon
to the chroot_directory setting in sshd_config file or user entry in the
system password file.
No QXCR The sshd daemon is passing some garbage bytes to audit utility. Initialize
the fifth argument to NULL in the function
audit_record_login_start().
No QXCR The sshd daemon is slow and runs out of ports with X11Forwarding under
the following configuration:
sshd_config:
X11UseLocalHost yes
X11Forwarding yes
/etc/hosts:
2 or more lines of duplicated localhost or loopback
addresses.
127.0.0.1 localhost loopback
127.0.0.1 localhost loopback
/etc/nsswitch.conf
files dns ldap
This defect is fixed.
QXCR1000873768 After upgrading from ssh 4.7 to 5.10, when you connect to a Solaris box,
the following message is displayed:
/usr/bin/sftp user@host
Connecting to host...
xmalloc: zero size
Connection closed
This defect is fixed.
8 HP-UX Secure Shell A.05.10.045, A.05.10.046, and A.05.10.047