From OpenSSH 8.5 release notes [0]: "Security ======== * ssh-agent(1): fixed a double-free memory corruption that was introduced in OpenSSH 8.2 . We treat all such memory faults as potentially exploitable. This bug could be reached by an attacker with access to the agent socket. On modern operating systems where the OS can provide information about the user identity connected to a socket, OpenSSH ssh-agent and sshd limit agent socket access only to the originating user and root. Additional mitigation may be afforded by the system's malloc(3)/free(3) implementation, if it detects double-free conditions. The most likely scenario for exploitation is a user forwarding an agent either to an account shared with a malicious user or to a host with an attacker holding root access. * [irrelevant vulnerability for non-Sun PAM]" [0] https://www.openssh.com/txt/release-8.5
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=77e3bbd9528150668daa02b6afffe1183a482782 commit 77e3bbd9528150668daa02b6afffe1183a482782 Author: Patrick McLean <patrick.mclean@sony.com> AuthorDate: 2021-03-04 07:03:14 +0000 Commit: Patrick McLean <chutzpah@gentoo.org> CommitDate: 2021-03-04 07:03:14 +0000 net-misc/openssh-8.5_p1: Version bump Bug: https://bugs.gentoo.org/774090 Copyright: Sony Interactive Entertainment Inc. Package-Manager: Portage-3.0.16, Repoman-3.0.2 Signed-off-by: Patrick McLean <chutzpah@gentoo.org> net-misc/openssh/Manifest | 6 + .../openssh/files/openssh-8.5_p1-GSSAPI-dns.patch | 112 +++++ .../files/openssh-8.5_p1-X509-glue-13.0.patch | 73 +++ .../files/openssh-8.5_p1-hpn-15.1-X509-glue.patch | 325 +++++++++++++ .../files/openssh-8.5_p1-hpn-15.1-glue.patch | 242 ++++++++++ .../files/openssh-8.5_p1-hpn-15.1-sctp-glue.patch | 18 + net-misc/openssh/openssh-8.5_p1.ebuild | 515 +++++++++++++++++++++ 7 files changed, 1291 insertions(+)
Thanks! Tell us when ready to stable.
ping? chutzpah had no objections
amd64 stable
arm done
x86 stable
hppa stable
ppc stable
s390 stable
sparc stable
ppc64 stable
arm64 done all arches done
Please cleanup.
Added to an existing GLSA request.
This issue was resolved and addressed in GLSA 202105-35 at https://security.gentoo.org/glsa/202105-35 by GLSA coordinator Thomas Deutschmann (whissi).