Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 154389 - net-misc/openssh 4.5 (fixes privilege separation bug) (CVE-2006-5794)
Summary: net-misc/openssh 4.5 (fixes privilege separation bug) (CVE-2006-5794)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Other
: High minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A4? [noglsa] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2006-11-07 10:58 UTC by Rajiv Aaron Manglani (RETIRED)
Modified: 2019-12-30 12:24 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Rajiv Aaron Manglani (RETIRED) gentoo-dev 2006-11-07 10:58:53 UTC
---------- Forwarded message ----------
From: Damien Miller <djm@cvs.openbsd.org>
To: openssh-unix-announce@mindrot.org
Date: Tue, 7 Nov 2006 11:40:36 -0700 (MST)
Subject: [openssh-unix-announce] Announce: OpenSSH 4.5 released

OpenSSH 4.5 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots and purchased
T-shirts or posters.

T-shirt, poster and CD sales directly support the project. Pictures
and more information can be found at:
        http://www.openbsd.org/tshirts.html and
	http://www.openbsd.org/orders.html

For international orders use http://https.openbsd.org/cgi-bin/order
and for European orders, use http://https.openbsd.org/cgi-bin/order.eu

Changes since OpenSSH 4.4:
============================

This is a bugfix only release. No new features have been added.

Security bugs resolved in this release:

 * Fix a bug in the sshd privilege separation monitor that weakened its
   verification of successful authentication. This bug is not known to
   be exploitable in the absence of additional vulnerabilities.

This release includes the following non-security fixes:

 * Several compilation fixes for portable OpenSSH

 * Fixes to Solaris SMF/process contract support (bugzilla #1255)

Thanks to everyone who has contributed patches, reported bugs and
tested releases.

Checksums:
==========

- SHA1 (openssh-4.5.tar.gz) = def3de1557181062d788695b9371d02635af39fb
- SHA1 (openssh-4.5p1.tar.gz) = 2eefcbbeb9e4fa16fa4500dec107d1a09d3d02d7

Reporting Bugs:
===============

- please read http://www.openssh.com/report.html
  and http://bugzilla.mindrot.org/

OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
Ben Lindstrom.

_______________________________________________
openssh-unix-announce mailing list
openssh-unix-announce@mindrot.org
http://lists.mindrot.org/mailman/listinfo/openssh-unix-announce
Comment 1 SpanKY gentoo-dev 2006-11-07 15:02:50 UTC
4.5_p1 in portage
Comment 2 Matthias Geerdsen (RETIRED) gentoo-dev 2006-11-09 05:56:46 UTC
vapier, is the ebuild ready for stable marking or is there still stuff missing like the last time?
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-11-20 22:13:55 UTC
Vapier please advise.
Comment 4 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-12-15 07:53:01 UTC
re-ping?
Comment 5 SpanKY gentoo-dev 2006-12-29 17:57:32 UTC
yes, 4.5_p1 is OK for stable
Comment 6 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-01-06 12:19:04 UTC
Arches please test and mark stable. Target keywords are:

openssh-4.5_p1.ebuild:KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc ~sparc-fbsd x86 ~x86-fbsd"
Comment 7 Christian Faulhammer (RETIRED) gentoo-dev 2007-01-06 16:08:11 UTC
x86 stable
Comment 8 Jeroen Roovers (RETIRED) gentoo-dev 2007-01-06 19:52:12 UTC
Stable for HPPA.
Comment 9 Markus Rothe (RETIRED) gentoo-dev 2007-01-07 12:05:31 UTC
ppc64 stable
Comment 10 Tobias Scherbaum (RETIRED) gentoo-dev 2007-01-07 18:15:23 UTC
ppc stable
Comment 11 Gustavo Zacarias (RETIRED) gentoo-dev 2007-01-08 12:20:25 UTC
sparc stable.
Comment 12 Bryan Østergaard (RETIRED) gentoo-dev 2007-01-08 15:01:22 UTC
Stable on Alpha.
Comment 13 Michael Cummings (RETIRED) gentoo-dev 2007-01-08 19:37:05 UTC
stable on amd64
Comment 14 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-01-12 22:23:28 UTC
Time to vote

from CVE:
NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.

i vote noglsa.
Comment 15 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-01-14 18:44:20 UTC
Voting NO and closing. Feel free to reopen if you disagree.