Summary: | <net-misc/openssh-7.5_p1: Multiple Vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/12/19/2 | ||
Whiteboard: | A4 [noglsa cve] | ||
Package list: |
=net-misc/openssh-7.5_p1-r1
|
Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() I am not sure if we need this security bug. The only real security problem is CVE-2016-8858 which was already handled in bug 597360. At least no A3. i'm working on the hpn update. we'll see if x509 comes out soon (it usually does) before doing the bump. (In reply to SpanKY from comment #2) > i'm working on the hpn update. we'll see if x509 comes out soon (it usually > does) before doing the bump. http://dev.gentoo.org/~polynomial-c/openssh-7.4p1-hpnssh14v12.tar.xz (In reply to Lars Wendler (Polynomial-C) from comment #3) > (In reply to SpanKY from comment #2) > > i'm working on the hpn update. we'll see if x509 comes out soon (it usually > > does) before doing the bump. > > http://dev.gentoo.org/~polynomial-c/openssh-7.4p1-hpnssh14v12.tar.xz Damn, screw it. I broke something :-( (In reply to Lars Wendler (Polynomial-C) from comment #4) don't worry about it ... i need to do the rebase anyways to push to the upstream hpn git repo i've pushed out my 7.4p1 updates, sans hpn. hitting interop test failures again like we were with 7.2p1. i don't think we ever tracked down those issues, they just seemed to go away with 7.3p1. Mike, It doesn't build with USE=X509. Without it, it does. Here's the error: In file included from ssh.c:123:0: ssh.c: In function ‘main’: version.h:5:46: error: expected ‘)’ before ‘SSH_X509’ #define SSH_RELEASE SSH_VERSION SSH_PORTABLE SSH_X509 ^ ssh.c:807:8: note: in expansion of macro ‘SSH_RELEASE’ SSH_RELEASE, ^~~~~~~~~~~ ssh.c:806:26: warning: format ‘%s’ expects a matching ‘char *’ argument [-Wformat=] fprintf(stderr, "%s, %s\n", ^ In file included from ssh.c:123:0: version.h:5:46: error: expected ‘)’ before ‘SSH_X509’ #define SSH_RELEASE SSH_VERSION SSH_PORTABLE SSH_X509 ^ ssh.c:1064:19: note: in expansion of macro ‘SSH_RELEASE’ logit("%s, %s", SSH_RELEASE, ^~~~~~~~~~~ ssh.c:1064:15: warning: format ‘%s’ expects a matching ‘char *’ argument [-Wformat=] logit("%s, %s", SSH_RELEASE, ^ I'm using gcc-6.2 in case it matters. Thanks, Calchan. (In reply to Denis Dupeyron from comment #7) > > It doesn't build with USE=X509. Without it, it does. > See bug #603610 Mike, for some reason unknown to me, in version.h putting SSH_X509 on it own #define line works. (In reply to Denis Dupeyron from comment #7) should be fixed by: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c4f141d88c8d955ecbe86554ef21892b0aec762a @ Maintainer(s): While most issues form 7.4 changelog should be already addressed in our 7.3 versions please tell us if we are ready to start stabilization of =net-misc/openssh-7.4_p1 or how you would like to proceed. 7.5p1 is in the tree now w/hpn patchset since it is passing tests for me. i guess give it a few weeks and we can stabilize that. haven't heard of any other 7.4p1 regressions. Note CVE's have only been filed up to 7.4.1_p1 (7.5 and 7.5.1 CVE's to be added at a later time). 7.5p1-r1 is now in the tree with the updated X509 patch, it passes tests with both just X509 and X509+hpn Maintainer(s), please advise if you are ready for stabilization or call for stabilization yourself. Checked on bugs .. does not look like any. Are we ready for it now? We have been holding on to this vulnerability for a few months? are you ready for stabilization? Arches please test and mark stable =net-misc/openssh-7.5_p1-r1 with target KEYWORDS: alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris x86 stable amd64 stable sparc stable ia64 stable ppc64 stable arm stable Stable on alpha. ppc stable Arches, please finish stabilizing hppa Gentoo Security Padawan ChrisADR hppa stable (In reply to Thomas Deutschmann from comment #1) > I am not sure if we need this security bug. The only real security problem > is CVE-2016-8858 which was already handled in bug 597360. At least no A3. Agreed. Tree is clean. GLSA Vote: No |