From 84a89161a9629239b64171ef3e22ef6a3e462d51 Mon Sep 17 00:00:00 2001 From: Damien Miller Date: Wed, 2 Jul 2014 12:47:48 +1000 Subject: - matthew@cvs.openbsd.org 2014/06/18 02:59:13 [sandbox-systrace.c] Now that we have a dedicated getentropy(2) system call for arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace sandbox. ok djm --- ChangeLog | 7 +++++++ 1 file changed, 7 insertions(+) (limited to 'ChangeLog') diff --git a/ChangeLog b/ChangeLog index 50e549ece..99e59c1e4 100644 --- a/ChangeLog +++ b/ChangeLog @@ -4,6 +4,13 @@ [sandbox-systrace.c] permit SYS_getentropy from matthew + - matthew@cvs.openbsd.org 2014/06/18 02:59:13 + [sandbox-systrace.c] + Now that we have a dedicated getentropy(2) system call for + arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace + sandbox. + + ok djm 20140618 - (tim) [openssh/session.c] Work around to get chroot sftp working on UnixWare -- cgit v1.2.3