-
-
Notifications
You must be signed in to change notification settings - Fork 14.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
openssh_{hpn,gssapi}: add backported security fix patches #323768
Conversation
Fixes a critical security bug allowing remote code execution as root: <https://www.openssh.com/txt/release-9.8> This may be CVE-2024-6387 (currently embargoed): <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387> Thanks to upstream and Sam James <sam@gentoo.org> for the backport: <gentoo/gentoo@1633ef4> Please don’t use these packages on the open internet if you care a lot about security.
9a0d61b
to
e215591
Compare
Successfully created backport PR for |
Successfully created backport PR for |
What's the need for these patches on OpenSSH 9.8p1? The patches claim to be backports, so I'd have thought they'd only be needed for earlier releases that don't have the full upstream fixes. That is, why is it necessary to have both this change and #323753? |
They are not applied to 9.8p1. This PR backports them for non-upstream variants of OpenSSH that have not yet caught up with 9.8p1. |
Ah yes, of course! I completely misread the patch. Thank you for explaining. |
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: |
Fixes a critical security bug allowing remote code execution as root: https://www.openssh.com/txt/release-9.8
This may be CVE-2024-6387 (currently embargoed): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387
Thanks to upstream and Sam James for the backport: gentoo/gentoo@1633ef4
Please don’t use these packages on the open internet if you care a lot about security.
Description of changes
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.