Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 29417 - OpenSSH 3.7.1p2 fixes pam vulerabilities
Summary: OpenSSH 3.7.1p2 fixes pam vulerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High critical (vote)
Assignee: Gentoo Security
URL: http://www.openssh.com/txt/sshpam.adv
Whiteboard:
Keywords: EBUILD
Depends on:
Blocks:
 
Reported: 2003-09-23 06:19 UTC by Christian Gut
Modified: 2003-09-23 16:25 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
openssh-3.7.1_p2.ebuild (openssh-3.7.1_p2.ebuild,4.01 KB, text/plain)
2003-09-23 07:36 UTC, Christian Gut
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Christian Gut 2003-09-23 06:19:25 UTC
Portable OpenSSH versions 3.7p1 and 3.7.1p1 contain multiple 
        vulnerabilities in the new PAM code. At least one of these bugs 
        is remotely exploitable (under a non-standard configuration, 
        with privsep disabled). 

        The OpenBSD releases of OpenSSH do not contain this code and 
        are not vulnerable. Older versions of portable OpenSSH are not 
        vulnerable.


Reproducible: Always
Steps to Reproduce:
Comment 1 Christian Gut 2003-09-23 07:36:37 UTC
Created attachment 18204 [details]
openssh-3.7.1_p2.ebuild

only deleted the four patches which were introduced in
openssh-3.7.1_p1-r1.ebuild
seems to work here on two machines...
Comment 2 Christian Rubbert 2003-09-23 11:42:18 UTC
Bugger, came in second this time :)

Subject: Portable OpenSSH Security Advisory: sshpam.adv

This document can be found at:  http://www.openssh.com/txt/sshpam.adv

1. Versions affected:

        Portable OpenSSH versions 3.7p1 and 3.7.1p1 contain multiple 
        vulnerabilities in the new PAM code. At least one of these bugs 
        is remotely exploitable (under a non-standard configuration, 
        with privsep disabled).

        The OpenBSD releases of OpenSSH do not contain this code and 
        are not vulnerable. Older versions of portable OpenSSH are not 
        vulnerable.

2. Solution:

        Upgrade to Portable OpenSSH 3.7.1p2 or disable PAM 
        support ("UsePam no" in sshd_config). 

        Due to complexity, inconsistencies in the specification and 
        differences between vendors' PAM implementations we recommend 
        that PAM be left disabled in sshd_config unless there is a need 
        for its use. Sites only using public key or simple password 
        authentication usually have little need to enable PAM support.
Comment 3 solar (RETIRED) gentoo-dev 2003-09-23 16:25:58 UTC
openssh-3.7.1_p2 is in portage.

Thank you ( Christian Gut ) for reporting this, we saw your post on the gentoo-dev mailing this before this bug and your ebuild attachment.

The X509 patch had to be disabled due to it not existing upstream yet. Right now 3.7.1_p2 is ~arch masked and will be marked stable by each of the arch herds after its been fully tested.

A Gentoo Linux Security Announcement was sent out. openssh (200309-14)
http://forums.gentoo.org/viewtopic.php?t=88566

changing bug resolution to FIXED