1 |
Its allready fixed in gentoo here is a copy of the anouncement send to the anouncement list. |
2 |
- -------------------------------------------------------------------------- |
3 |
GENTOO LINUX SECURITY ANNOUNCEMENT |
4 |
- -------------------------------------------------------------------------- |
5 |
|
6 |
PACKAGE :openssh |
7 |
SUMMARY :vulnerable to a off-by-one error in the channel code |
8 |
DATE :2002-04-7 18:02:00 |
9 |
|
10 |
- -------------------------------------------------------------------------- |
11 |
|
12 |
OVERVIEW |
13 |
|
14 |
|
15 |
A bug exists in the channel code of OpenSSH versions 2.0 - 3.0.2 |
16 |
Users with an existing user account can abuse this bug to |
17 |
gain root privileges. Exploitability without an existing |
18 |
user account has not been proven but is not considered |
19 |
impossible. A malicious ssh server could also use this bug |
20 |
to exploit a connecting vulnerable client. |
21 |
|
22 |
|
23 |
DETAIL |
24 |
|
25 |
http://www.pine.nl/advisories/pine-cert-20020301.txt |
26 |
|
27 |
|
28 |
SOLUTION |
29 |
|
30 |
|
31 |
It is recommended that all openssh users apply the update |
32 |
|
33 |
Portage Auto: |
34 |
|
35 |
emerge rsync |
36 |
emerge update |
37 |
emerge update --world |
38 |
|
39 |
|
40 |
Portage by hand: |
41 |
|
42 |
emerge rsync |
43 |
emerge net-misc/openssh |
44 |
|
45 |
Manually: |
46 |
|
47 |
Download the new openssh package here and follow in file instructions: |
48 |
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-3.1p1.tar.gz |
49 |
|
50 |
- -------------------------------------------------------------------------- |
51 |
Ferry Meyndert |
52 |
m0rpheus@g.o |
53 |
- -------------------------------------------------------------------------- |
54 |
|
55 |
|
56 |
On Thu, 07 Mar 2002 20:04:55 +0000 |
57 |
Chris Davies <c.davies@×××××××.org> wrote: |
58 |
|
59 |
> Hi, |
60 |
> |
61 |
> I haven't seen anything in bugs or this list about this, so here is the |
62 |
> news: |
63 |
> CERT have issued an advisory about OpenSSH, the bug in question enables |
64 |
> existing users to gain root privelidges. |
65 |
> The advisory is here: http://www.pine.nl/advisories/pine-cert-20020301.txt |
66 |
> The fix is to upgrade to the latest OpenSSH (3.1p1) ASAP. |
67 |
> May I politely suggest that a new ebuild be constructed post-haste? :) |
68 |
> Anyway, for those at risk, I have constructed an emergency ebuild and |
69 |
> digest file, so you may upgrade immediately. |
70 |
> The files can be found here: http://www.cdavies.org/gentoo/ |
71 |
> |
72 |
> Put the digest file in /usr/portage/net-misc/openssh/files and the |
73 |
> ebuild in /usr/portage/net-misc/openssh and rerun emerge openssh. |
74 |
> |
75 |
> If anyone thinks it is worthwhile, I will also post this message to the |
76 |
> gentoo users list, but at present I'm not going to do that. |
77 |
> Thanks, |
78 |
> C.Davies |
79 |
> (c.davies@×××××××.org) |
80 |
> |
81 |
> |
82 |
> _______________________________________________ |
83 |
> gentoo-dev mailing list |
84 |
> gentoo-dev@g.o |
85 |
> http://lists.gentoo.org/mailman/listinfo/gentoo-dev |