On Tue, Oct 08, 2019 at 05:23:56AM -0400, Michael Richardson wrote:
> Salvatore Bonaccorso <car...@debian.org> wrote:
>     > 
> -------------------------------------------------------------------------
>     > Debian Security Advisory DSA-4539-2                   
> secur...@debian.org
>     > https://www.debian.org/security/                     Salvatore 
> Bonaccorso
>     > October 07, 2019                      
> https://www.debian.org/security/faq
>     > 
> -------------------------------------------------------------------------
> 
>     > Package        : openssh
>     > Debian Bug     : 941663
> 
>     > A change introduced in openssl 1.1.1d (which got released as DSA 4539-1)
>     > requires sandboxing features which are not available in Linux kernels
>     > before 3.19, resulting in OpenSSH rejecting connection attempts if
> 
> I've gone through the changelog for 1.1.1d, but I can't figure out what
> 1.1.1d would have changed that would have caused this.

The RNG uses sysV shm to convey to other processes that /dev/[u]random has been
properly seeded, under some configurations/kernel versions.

-Ben

Reply via email to