Bug 1950819 - openssh-8.6p1 is available
Summary: openssh-8.6p1 is available
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: openssh
Version: rawhide
Hardware: Unspecified
OS: Unspecified
high
unspecified
Target Milestone: ---
Assignee: Dmitry Belyavskiy
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks: 1952957
TreeView+ depends on / blocked
 
Reported: 2021-04-19 00:14 UTC by Upstream Release Monitoring
Modified: 2021-06-03 10:08 UTC (History)
8 users (show)

Fixed In Version: openssh-8.6p1-3.fc34
Clone Of:
: 1952957 (view as bug list)
Environment:
Last Closed: 2021-06-03 10:08:14 UTC
Type: ---
Embargoed:
fedora-admin-xmlrpc: mirror+


Attachments (Terms of Use)

Description Upstream Release Monitoring 2021-04-19 00:14:21 UTC
Latest upstream release: 8.6p1
Current version/release in rawhide: 8.5p1-2.fc35
URL: https://www.openssh.com/

Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream.


Based on the information from anitya: https://release-monitoring.org/project/2565/

Comment 1 Jakub Jelen 2021-04-19 09:46:38 UTC
FYI, this is a security release and we should update it soon:

 * sshd(8): OpenSSH 8.5 introduced the LogVerbose keyword. When this
   option was enabled with a set of patterns that activated logging
   in code that runs in the low-privilege sandboxed sshd process, the
   log messages were constructed in such a way that printf(3) format
   strings could effectively be specified the low-privilege code.

   An attacker who had sucessfully exploited the low-privilege
   process could use this to escape OpenSSH's sandboxing and attack
   the high-privilege process. Exploitation of this weakness is
   highly unlikely in practice as the LogVerbose option is not
   enabled by default and is typically only used for debugging. No
   vulnerabilities in the low-privilege process are currently known
   to exist.

   Thanks to Ilja Van Sprundel for reporting this bug.

https://www.openssh.com/txt/release-8.6

Comment 2 Dmitry Belyavskiy 2021-06-03 10:08:14 UTC
Update version: https://bodhi.fedoraproject.org/updates/FEDORA-2021-688ce97226


Note You need to log in before you can comment on or make changes to this bug.