From: <abe...@us...> - 2016-01-15 00:44:28
|
Revision: 7457 http://sourceforge.net/p/astlinux/code/7457 Author: abelbeck Date: 2016-01-15 00:44:27 +0000 (Fri, 15 Jan 2016) Log Message: ----------- openssh, 'UseRoaming' security fix: CVE-2016-0777, CVE-2016-0778 Added Paths: ----------- branches/1.0/package/openssh/openssh-UseRoaming-CVE-2016-0777-CVE-2016-0778.patch Added: branches/1.0/package/openssh/openssh-UseRoaming-CVE-2016-0777-CVE-2016-0778.patch =================================================================== --- branches/1.0/package/openssh/openssh-UseRoaming-CVE-2016-0777-CVE-2016-0778.patch (rev 0) +++ branches/1.0/package/openssh/openssh-UseRoaming-CVE-2016-0777-CVE-2016-0778.patch 2016-01-15 00:44:27 UTC (rev 7457) @@ -0,0 +1,43 @@ +Experimental roaming code in the ssh client could be tricked by a +hostile sshd server, potentially leaking key material. +CVE-2016-0777 and CVE-2016-0778. +Prevent this problem immediately by adding the line "UseRoaming no" to +/etc/ssh/ssh_config. + +Index: usr.bin/ssh/readconf.c +=================================================================== +--- openssh-6.6p1/readconf.c 30 Jul 2015 00:01:34 -0000 ++++ openssh-6.6p1/readconf.c 13 Jan 2016 23:17:23 -0000 +@@ -1556,7 +1556,7 @@ initialize_options(Options * options) + options->tun_remote = -1; + options->local_command = NULL; + options->permit_local_command = -1; +- options->use_roaming = -1; ++ options->use_roaming = 0; + options->visual_host_key = -1; + options->ip_qos_interactive = -1; + options->ip_qos_bulk = -1; +@@ -1723,8 +1723,7 @@ fill_default_options(Options * options) + options->tun_remote = SSH_TUNID_ANY; + if (options->permit_local_command == -1) + options->permit_local_command = 0; +- if (options->use_roaming == -1) +- options->use_roaming = 1; ++ options->use_roaming = 0; + if (options->visual_host_key == -1) + options->visual_host_key = 0; + if (options->ip_qos_interactive == -1) +Index: usr.bin/ssh/ssh.c +=================================================================== +--- openssh-6.6p1/ssh.c 30 Jul 2015 00:01:34 -0000 ++++ openssh-6.6p1/ssh.c 13 Jan 2016 23:17:23 -0000 +@@ -1729,9 +1729,6 @@ ssh_session2(void) + fork_postauth(); + } + +- if (options.use_roaming) +- request_roaming(); +- + return client_loop(tty_flag, tty_flag ? + options.escape_char : SSH_ESCAPECHAR_NONE, id); + } This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. |