summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMike Frysinger <vapier@gentoo.org>2006-01-23 22:58:22 +0000
committerMike Frysinger <vapier@gentoo.org>2006-01-23 22:58:22 +0000
commit6fa4da68dbe5ada2055772c53dabbc4a221127fb (patch)
treef3e516ffc7460df3bc68a46df2a88b09d6e7998b /net-misc
parentRemove pear USE from dev-lang/php. (diff)
downloadhistorical-6fa4da68dbe5ada2055772c53dabbc4a221127fb.tar.gz
historical-6fa4da68dbe5ada2055772c53dabbc4a221127fb.tar.bz2
historical-6fa4da68dbe5ada2055772c53dabbc4a221127fb.zip
Add security fix #119966.
Package-Manager: portage-2.1_pre3-r1
Diffstat (limited to 'net-misc')
-rw-r--r--net-misc/lsh/ChangeLog10
-rw-r--r--net-misc/lsh/Manifest11
-rw-r--r--net-misc/lsh/files/digest-lsh-2.0.1-r11
-rw-r--r--net-misc/lsh/files/lsh-2.0.1-fix-fd-leak.patch63
-rw-r--r--net-misc/lsh/lsh-2.0.1-r1.ebuild73
5 files changed, 152 insertions, 6 deletions
diff --git a/net-misc/lsh/ChangeLog b/net-misc/lsh/ChangeLog
index 2757bf1b4a6f..b1630efedc98 100644
--- a/net-misc/lsh/ChangeLog
+++ b/net-misc/lsh/ChangeLog
@@ -1,6 +1,12 @@
# ChangeLog for net-misc/lsh
-# Copyright 2000-2005 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/lsh/ChangeLog,v 1.5 2005/09/16 23:30:19 ciaranm Exp $
+# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2
+# $Header: /var/cvsroot/gentoo-x86/net-misc/lsh/ChangeLog,v 1.6 2006/01/23 22:58:22 vapier Exp $
+
+*lsh-2.0.1-r1 (23 Jan 2006)
+
+ 23 Jan 2006; Mike Frysinger <vapier@gentoo.org>
+ +files/lsh-2.0.1-fix-fd-leak.patch, +lsh-2.0.1-r1.ebuild:
+ Add security fix #119966.
16 Sep 2005; Ciaran McCreesh <ciaranm@gentoo.org> ChangeLog:
Converted to UTF-8, fixed encoding screwups
diff --git a/net-misc/lsh/Manifest b/net-misc/lsh/Manifest
index 1b186bb2cde3..56473d4d8d17 100644
--- a/net-misc/lsh/Manifest
+++ b/net-misc/lsh/Manifest
@@ -1,15 +1,18 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
-MD5 f96b557191c2c6ae08c7970add58834e ChangeLog 1913
+MD5 528c137d5fa606bb6dd3ab59db5214f3 ChangeLog 2080
MD5 912d87383add43e1cb70bcbe484dc674 files/digest-lsh-2.0.1 62
+MD5 912d87383add43e1cb70bcbe484dc674 files/digest-lsh-2.0.1-r1 62
+MD5 17924a8f895867a1cb1c97131000a329 files/lsh-2.0.1-fix-fd-leak.patch 2170
MD5 6813ec4e9dc95f6767e612961d38f090 files/lsh.confd 210
MD5 3e325f3a64bf91a900f317fd2e49a4c2 files/lsh.rc 814
+MD5 5fa2bcd31f5202b31961d7cb68445eae lsh-2.0.1-r1.ebuild 2138
MD5 31689a24c8ac91fb8ec178c531f44392 lsh-2.0.1.ebuild 2088
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
-iD8DBQFDzGWY2+ySkm8kpY0RAlcKAJ9FUd5sOAQevjC89c9KwWLL+Lu2ZACZAen2
-kjnw7B0Hh8b6UfpfON1xZ+4=
-=vavE
+iD8DBQFD1WAl2+ySkm8kpY0RApTBAJ45PRAy60BpoTjI3to7uB8k9NRy4gCgp9xE
+0efhxqS8ydRQGv31vIPcH04=
+=8sZR
-----END PGP SIGNATURE-----
diff --git a/net-misc/lsh/files/digest-lsh-2.0.1-r1 b/net-misc/lsh/files/digest-lsh-2.0.1-r1
new file mode 100644
index 000000000000..689cda9ed926
--- /dev/null
+++ b/net-misc/lsh/files/digest-lsh-2.0.1-r1
@@ -0,0 +1 @@
+MD5 25ca0b4385779de3d58d2d5757f495c3 lsh-2.0.1.tar.gz 1866063
diff --git a/net-misc/lsh/files/lsh-2.0.1-fix-fd-leak.patch b/net-misc/lsh/files/lsh-2.0.1-fix-fd-leak.patch
new file mode 100644
index 000000000000..0a19318a642c
--- /dev/null
+++ b/net-misc/lsh/files/lsh-2.0.1-fix-fd-leak.patch
@@ -0,0 +1,63 @@
+http://bugs.gentoo.org/119966
+http://lists.lysator.liu.se/pipermail/lsh-bugs/2006q1/000467.html
+
+From: Niels Möller nisse at lysator.liu.se
+Date: Fri Jan 20 17:44:07 CET 2006
+Subject: SECURITY: lshd leaks fd:s to user shells
+
+Stefan Pfetzing noticed that lshd leaks a couple of file descriptors,
+related to the randomness generator, to user shells which are started
+by lshd.
+
+This is a security problem, in at least two ways:
+
+* A user can truncate the server's seed file, which may prevent the
+ server from starting.
+
+* By reading the file, a user can get information that may be useful
+ for cracking other user's session keys, as well as public keys that
+ are generated from the disclosed seed file. (To understand what the
+ impact is, one must understand how yarrow generates and uses the
+ seed file. My initial analysis is that reading the seed-file is
+ advantageous only if it is read just prior to the start of some
+ process using the seed for initialization.)
+
+This is a local hole. It provides for fairly easy denial of service by
+local users, and with some more effort, maybe also cracking of session
+keys.
+
+The below patch, relative to lsh-2.0.1, seems to solve the problem.
+After applying the patch, you should remove and then regenerate the
+server's seed file (since users may still have open fd:s), and restart
+lshd.
+
+I hope to be able to put together a new release sometime next week.
+I'll be off-line over the weekend. In the mean time, feel free to
+inform other distributors and appropriate security fora about the
+problem.
+
+Sorry for the inconvenience,
+/Niels
+
+*** src/unix_random.c.~1.17.~ 2004-11-17 22:13:27.000000000 +0100
+--- src/unix_random.c 2006-01-20 14:26:05.000000000 +0100
+***************
+*** 258,263 ****
+--- 258,264 ----
+ if (self->device_fd < 0)
+ return 0;
+
++ io_set_close_on_exec(self->device_fd);
+ self->device_last_read = now;
+ }
+
+***************
+*** 381,386 ****
+--- 382,388 ----
+ return NULL;
+ }
+
++ io_set_close_on_exec(self->seed_file_fd);
+ trace("random_init, reading seed file...\n");
+
+ if (!read_initial_seed_file(&self->yarrow, self->seed_file_fd))
diff --git a/net-misc/lsh/lsh-2.0.1-r1.ebuild b/net-misc/lsh/lsh-2.0.1-r1.ebuild
new file mode 100644
index 000000000000..c32e23567a61
--- /dev/null
+++ b/net-misc/lsh/lsh-2.0.1-r1.ebuild
@@ -0,0 +1,73 @@
+# Copyright 1999-2006 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-misc/lsh/lsh-2.0.1-r1.ebuild,v 1.1 2006/01/23 22:58:22 vapier Exp $
+
+inherit eutils
+
+DESCRIPTION="A GNU implementation of the Secure Shell protocols"
+HOMEPAGE="http://www.lysator.liu.se/~nisse/lsh/"
+SRC_URI="ftp://ftp.lysator.liu.se/pub/security/lsh/${P}.tar.gz
+ http://www.lysator.liu.se/~nisse/archive/${P}.tar.gz"
+
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="~amd64 ~ppc ~sparc ~x86"
+IUSE="pam tcpd ipv6 zlib X"
+
+RDEPEND="dev-libs/gmp
+ dev-libs/liboop
+ dev-libs/nettle
+ zlib? ( sys-libs/zlib )
+ X? ( virtual/x11 )
+ tcpd? ( sys-apps/tcp-wrappers )
+ pam? ( sys-libs/pam )"
+# kerberos? ( virtual/krb5 )
+DEPEND="${RDEPEND}
+ >=sys-apps/portage-2.0.51"
+
+src_unpack() {
+ unpack ${A}
+ cd "${S}"
+ epatch "${FILESDIR}"/${P}-fix-fd-leak.patch
+ # remove bundled nettle crap #56156 ... this is pretty ugly sed foo,
+ # but the alternative is a bigger, uglier patch which would probably
+ # need updating with every version :/
+ sed -i -e '/src\/nettle/d' configure || die "sed configure failed"
+ sed -i \
+ -e '/^SUBDIRS/s:nettle::' \
+ -e '/^LDADD/s:nettle/libnettle\.a:-lnettle:' \
+ -e 's:nettle/libnettle\.a::' \
+ src/Makefile.in || die "sed src failed"
+ sed -i \
+ -e 's:\.\./\.\./nettle/libnettle\.a::' \
+ src/spki/tools/Makefile.in || die "sed spki failed"
+ sed -i \
+ -e '/^LDADD/s:\.\./nettle/libnettle\.a:-lnettle:' \
+ -e 's:\.\./nettle/libnettle\.a::' \
+ src/testsuite/Makefile.in || die "sed test failed"
+ rm -r src/nettle
+}
+
+src_compile() {
+ # configure script checks /dev/ptmx in order to enable
+ # proper unix pty support ... so lets fake that it works :)
+ addpredict /dev/ptmx
+# $(use_enable kerberos)
+ econf \
+ --disable-kerberos \
+ $(use_enable pam) \
+ $(use_enable ipv6) \
+ $(use_with zlib) \
+ $(use_with tcpd tcpwrappers) \
+ $(use_with X x) \
+ || die
+ emake || die "emake failed"
+}
+
+src_install() {
+ emake install DESTDIR="${D}" || die "install failed"
+ dodoc ANNOUNCE AUTHORS ChangeLog FAQ NEWS README
+
+ newinitd "${FILESDIR}"/lsh.rc lshd
+ newconfd "${FILESDIR}"/lsh.confd lshd
+}