Uploaded image for project: 'Funtoo Linux'
  1. Funtoo Linux
  2. FL-7545

Openssh CVE-2020-14145 CVE-2020-15778

    • Icon: Security Vulnerability Security Vulnerability
    • Resolution: Fixed
    • Icon: Normal Normal
    • None
    • None
    • None
    • Hide
      Update to version 8.4_p1
      validate inherit clause
      Show
      Update to version 8.4_p1 validate inherit clause

      CVE-2020-14145

      The client side in OpenSSH 5.7 through 8.3 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).

      CVE-2020-15778

      scp in OpenSSH through 8.3p1 allows command injection in scp.c remote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."

      But i try local bump openssh to new version and i have problems. Probably with ebuild.
      Gentoo have new eclasses (user-info) in openssh ebuild.
      This update teke more work and test

      Additional with this task we can resolve bug FL-6656

            Unassigned Unassigned
            tczaude tczaude
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: