Gentoo Archives: gentoo-commits

From: "Mike Frysinger (vapier)" <vapier@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in net-misc/openssh/files: openssh-4.7_p1-packet-size.patch openssh-4.7_p1-lpk-64bit.patch openssh-4.7_p1-CVE-2008-1483.patch
Date: Sat, 29 Mar 2008 03:07:29
Message-Id: E1JfRPi-0008Dv-6m@stork.gentoo.org
1 vapier 08/03/29 03:07:26
2
3 Added: openssh-4.7_p1-packet-size.patch
4 openssh-4.7_p1-lpk-64bit.patch
5 openssh-4.7_p1-CVE-2008-1483.patch
6 Log:
7 Fix CVE-2008-1483 #214985. Fix from upstream for scp/packet problems #212433 by Steven Parkes. Fix from Piotr Stolc for some LPK configs under 64bit systems #210110. Add gsskex patch (for now) #115553.
8 (Portage version: 2.2_pre5)
9
10 Revision Changes Path
11 1.1 net-misc/openssh/files/openssh-4.7_p1-packet-size.patch
12
13 file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-misc/openssh/files/openssh-4.7_p1-packet-size.patch?rev=1.1&view=markup
14 plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-misc/openssh/files/openssh-4.7_p1-packet-size.patch?rev=1.1&content-type=text/plain
15
16 Index: openssh-4.7_p1-packet-size.patch
17 ===================================================================
18 Fix from upstream
19
20 http://bugs.gentoo.org/212433
21 https://bugzilla.mindrot.org/show_bug.cgi?id=1360
22
23 Index: clientloop.c
24 ===================================================================
25 RCS file: /usr/local/src/security/openssh/cvs/openssh/clientloop.c,v
26 retrieving revision 1.170
27 diff -u -p -r1.170 clientloop.c
28 --- clientloop.c 28 Dec 2007 15:45:07 -0000 1.170
29 +++ clientloop.c 28 Dec 2007 18:14:10 -0000
30 @@ -1745,7 +1745,7 @@ client_request_forwarded_tcpip(const cha
31 }
32 c = channel_new("forwarded-tcpip",
33 SSH_CHANNEL_CONNECTING, sock, sock, -1,
34 - CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0,
35 + CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0,
36 originator_address, 1);
37 xfree(originator_address);
38 xfree(listen_address);
39 @@ -1803,7 +1803,7 @@ client_request_agent(const char *request
40 return NULL;
41 c = channel_new("authentication agent connection",
42 SSH_CHANNEL_OPEN, sock, sock, -1,
43 - CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0,
44 + CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0,
45 "authentication agent connection", 1);
46 c->force_drain = 1;
47 return c;
48
49
50
51 1.1 net-misc/openssh/files/openssh-4.7_p1-lpk-64bit.patch
52
53 file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-misc/openssh/files/openssh-4.7_p1-lpk-64bit.patch?rev=1.1&view=markup
54 plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-misc/openssh/files/openssh-4.7_p1-lpk-64bit.patch?rev=1.1&content-type=text/plain
55
56 Index: openssh-4.7_p1-lpk-64bit.patch
57 ===================================================================
58 http://bugs.gentoo.org/210110
59
60 --- servconf.c
61 +++ servconf.c
62 @@ -690,6 +690,7 @@
63 {
64 char *cp, **charptr, *arg, *p;
65 int cmdline = 0, *intptr, value, n;
66 + unsigned long lvalue, *longptr;
67 ServerOpCodes opcode;
68 u_short port;
69 u_int i, flags = 0;
70 @@ -704,6 +705,7 @@
71 if (!arg || !*arg || *arg == '#')
72 return 0;
73 intptr = NULL;
74 + longptr = NULL;
75 charptr = NULL;
76 opcode = parse_token(arg, filename, linenum, &flags);
77
78 @@ -1421,11 +1423,20 @@
79 *intptr = value;
80 break;
81 case sBindTimeout:
82 - intptr = (int *) &options->lpk.b_timeout.tv_sec;
83 - goto parse_int;
84 + longptr = (unsigned long *) &options->lpk.b_timeout.tv_sec;
85 +parse_ulong:
86 + arg = strdelim(&cp);
87 + if (!arg || *arg == '\0')
88 + fatal("%s line %d: missing integer value.",
89 + filename, linenum);
90 + lvalue = atol(arg);
91 + if (*activep && *longptr == -1)
92 + *longptr = lvalue;
93 + break;
94 +
95 case sSearchTimeout:
96 - intptr = (int *) &options->lpk.s_timeout.tv_sec;
97 - goto parse_int;
98 + longptr = (unsigned long *) &options->lpk.s_timeout.tv_sec;
99 + goto parse_ulong;
100 break;
101 case sLdapConf:
102 arg = cp;
103
104
105
106 1.1 net-misc/openssh/files/openssh-4.7_p1-CVE-2008-1483.patch
107
108 file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-misc/openssh/files/openssh-4.7_p1-CVE-2008-1483.patch?rev=1.1&view=markup
109 plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-misc/openssh/files/openssh-4.7_p1-CVE-2008-1483.patch?rev=1.1&content-type=text/plain
110
111 Index: openssh-4.7_p1-CVE-2008-1483.patch
112 ===================================================================
113 Ripped from Fedora for CVE-2008-1483
114
115 http://bugs.gentoo.org/214985
116
117 --- openssh-3.9p1/channels.c
118 +++ openssh-3.9p1/channels.c
119 @@ -2653,9 +2653,6 @@
120 debug2("bind port %d: %.100s", port, strerror(errno));
121 close(sock);
122
123 - if (ai->ai_next)
124 - continue;
125 -
126 for (n = 0; n < num_socks; n++) {
127 close(socks[n]);
128 }
129
130
131
132 --
133 gentoo-commits@l.g.o mailing list