Summary: | <net-misc/openssh-5.1_p1-r1 do_authloop() Format String Privilege Escalation | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Matthias Geerdsen (RETIRED) <vorlon> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | critical | CC: | thoger | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://article.gmane.org/gmane.comp.security.full-disclosure/61860 | ||||||
Whiteboard: | A1 [glsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Matthias Geerdsen (RETIRED)
![]() According to upstream discussion, this requires fairly crafted conditions: http://marc.info/?l=openssh-unix-dev&m=121560026002907&w=2 Created attachment 159960 [details, diff]
openssh-auth1.c-formatstring.patch
djm committed this patch upstream.
We have "UsePrivilegeSeparation" default to "yes" by default, and I do not know all our PAM modules, and if any of them would allow output of attacker-controlled data.
What's the status here? Which version includes the patch? If we have a stable version in the tree, I'd be in favor of bypassing the policy and closing this one without GLSA, due to the extremely unlikely conditions required to exploit this. openssh-5.1_p1 has the fix already ... i'm not aware of any regressions specific to that version, so stabilizing it should be OK ... Thanks. So, let's get this stable. Arches, please test and stabilize: =net-misc/openssh-5.1_p1-r1 Target keywords: alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86 I'm assuming that vapier is OK with -r1 being stabled, according to ChangeLog it's just a fix for a build-time warning though (bug 235594). amd64/x86 stable Stable for HPPA. ppc64 done alpha/ia64/sparc stable ppc done (In reply to comment #3) > What's the status here? Which version includes the patch? If we have a stable > version in the tree, I'd be in favor of bypassing the policy and closing this > one without GLSA, due to the extremely unlikely conditions required to exploit > this. > Actually I'd still like to send a GLSA. Request filed, I'll draft it then. This issue was resolved and addressed in GLSA 201405-06 at http://security.gentoo.org/glsa/glsa-201405-06.xml by GLSA coordinator Mikle Kolyada (Zlogene). |