ArchLinux: 201507-4: openssh: XSECURITY restrictions bypass
Summary
When forwarding X11 connections with ForwardX11Trusted=no, connections made after ForwardX11Timeout expired could be permitted and no longer subject to XSECURITY restrictions because of an ineffective timeout check in ssh coupled with "fail open" behaviour in the X11 server when clients attempted connections with expired credentials. This problem was reported by Jann Horn.
Resolution
Upgrade to 6.9p1-1.
# pacman -Syu "openssh>=6.9p1-1"
The problem has been fixed upstream in version 6.9p1.
References
http://www.openssh.com/txt/release-6.9 https://access.redhat.com/security/cve/CVE-2015-5352
Workaround
None.