Subject: pkg/19130: bogus vulnerability listed in audit-packages for ssh-1.2.27nb2
To: None <gnats-bugs@gnats.netbsd.org>
From: None <dogcow@babymeat.com>
List: netbsd-bugs
Date: 11/22/2002 02:16:49
>Number: 19130
>Category: pkg
>Synopsis: bogus vulnerability listed in audit-packages for ssh-1.2.27nb2
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: pkg-manager
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Fri Nov 22 02:17:00 PST 2002
>Closed-Date:
>Last-Modified:
>Originator: Tom Spindler
>Release: NetBSD 1.6_STABLE
>Organization:
>Environment:
System: NetBSD beefcake.babymeat.com 1.6_STABLE NetBSD 1.6_STABLE (BEEFCAKE) #2: Sun Nov 17 23:29:44 PST 2002 dogcow@beefcake.babymeat.com:/media/src/src/sys/arch/i386/compile/BEEFCAKE i386
Architecture: i386
Machine: i386
>Description:
audit-packages's vulnerabilities file has the following line:
ssh<=1.2.31 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html
which causes it to emit a remote-root-shell vulnerability warning for
pkgsrc/security/ssh/.
However, the advisory cited says that the vulnerability is eliminated
if one makes a word16 -> word32 decl change - precisely that which is
in patches/patch-ca.
There may well be other vulnerabilities in this package, but it's not
the one given by the URL.
>How-To-Repeat:
install ssh, install audit-packages, run audit-packages.
>Fix:
Either correct the URL to the correct security advisory, or remove the
vulnerability from the 'vulerabilities' file.
>Release-Note:
>Audit-Trail:
>Unformatted: