https://bugzilla.mindrot.org/show_bug.cgi?id=3846
--- Comment #1 from Dmitry Belyavskiy <[email protected]> --- I'm afraid git bisect is not of much help =============== 6072e4c9385713e9c166f32cfca6a7e603d4f0b8 is the first bad commit commit 6072e4c9385713e9c166f32cfca6a7e603d4f0b8 Author: [email protected] <[email protected]> Date: Mon Oct 14 01:57:50 2024 +0000 upstream: Split per-connection sshd-session binary This splits the user authentication code from the sshd-session binary into a separate sshd-auth binary. This will be executed by sshd-session to complete the user authentication phase of the protocol only. Splitting this code into a separate binary ensures that the crucial pre-authentication attack surface has an entirely disjoint address space from the code used for the rest of the connection. It also yields a small runtime memory saving as the authentication code will be unloaded after thhe authentication phase completes. Joint work with markus@ feedback deraadt@ Tested in snaps since last week OpenBSD-Commit-ID: 9c3b2087ae08626ec31b4177b023db600e986d9c ================ -- You are receiving this mail because: You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
