guix-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 1/1] gnu: openssh: Fix CVE-2015-8325.


From: Leo Famulari
Subject: Re: [PATCH 1/1] gnu: openssh: Fix CVE-2015-8325.
Date: Fri, 15 Apr 2016 17:47:09 -0400
User-agent: Mutt/1.5.24 (2015-08-30)

On Fri, Apr 15, 2016 at 11:27:35PM +0200, Ludovic Courtès wrote:
> Leo Famulari <address@hidden> skribis:
> 
> > * gnu/packages/patches/openssh-CVE-2015-8325.patch: New file.
> > * gnu-system.am (dist_patch_DATA): Add it.
> > * gnu/packages/ssh.scm (openssh): Use it.
> 
> The explanation in the OpenSSH commit log is clear IMO and the fix looks
> reasonable, so I’d say go for it…
> 
> … but I can’t seem to find the change in the authoritative repo:
> 
>   http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c

The web page for the portable version of OpenSSH [0] (which is what we
package) says this:

"Normal OpenSSH development produces a very small, secure, and easy to
maintain version for the OpenBSD project. The OpenSSH Portability Team
takes that pure version and adds portability code so that OpenSSH can
run on many other operating systems (Unfortunately, in particular since
OpenSSH does authentication, it runs into a *lot* of differences between
Unix operating systems)."

The bug is related to how sshd interacts with PAM. My understanding is
that OpenBSD does not use PAM, so the bug would not exist in their
repository.

[0] FYI, I could not load this site over HTTPS
http://www.openssh.com/portable.html This page also links to the
repository that contains the patch.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]