On Fri, 2002-12-13 at 16:11, [EMAIL PROTECTED] wrote:
...
> well.... I guess this is a little confusing too. The redhat download centers 
> show for RH 7.3 the file:
> 
> openssh-3.1p1-3.i386.rpm  213 KB  04/17/2002  12:00:00 AM
> 
> and for RH 8.0 the file:
> 
> openssh-3.4p1-2.i386.rpm  213 KB  09/03/2002  09:33:00 PM
> 
> Looking at the date stamp in the RH 7.3 centers I'd say there's little chance 
> that this isn't vulnerable to the bug found this summer unless RH also back 
> dating the fixes?

The latest 7.3 openssh package is 3.1p1-6
make sure the redhat mirror you are using has the latest.
The 3.1p1-x, the 'X' part is the epoch number which according to redhat
outweighs the version number of the package.

So it could be possible for RedHat to release a package versioned
2.2-1, then release an errata package 2.3-2, and then have a superceding
errata release that is 2.2-3....  I guess that could be confusing, but I
can't think of a better way to do it.


I remember being worried about the openSSH versions too. There were 
a few of them in a short period of time, if I remember correctly,

I read the description of the vulnerability at the openSSH website and
they said that if you had disabled the S-key (or something like that)
that you weren't vulnerable. When I then went and checked the RedHat
package I had installed it didn't have S-Key Auth enabled anyway.  So I
waited for the RPM rather than jumping on the 3.4 tarball.

> Is it fair to say, then, that the errata page is THE source of information as 
> to whether or not a particular program is up-to-date, security wise?  Has any 
> thought been given, to the best of your knowledge, to show that a piece of 
> software has been modified to provide a security fix when the user does a 

The source packages have the change logs and notes in them,
and I could swear I remember reading an RPM command option somewhere
that would give that info too???

THE source of information is the source itself....  RedHat always has
source RPMS available for the Open Source licensed programs that they
distribute, but in this case it wasn't necessary, because the
Errata Notes at RHN (e.g. 
https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1047 )

Referenced the actual Vulnerability name:
        The Common Vulnerabilities and Exposures project (cve.mitre.org)        has
assigned the name CAN-2002-0083 to this issue.

The Errata Notes for Security problems almost always do refer to the
CERT or the CVE announcement.  Heck a lot of times  CERT even tells
you what package and FTP url to get the RedHat patch.

If I remember correctly there is a very VALID reason to back-port the
security fix to 3.1p1 rather than just distribute 3.4
The reason I think I remember is that version 3.4 required a newer
version of openssl, that new version of openssl that might have required
a change of lots of other programs like mod_ssl, stunnel, links, w3m,
fetchmail, etc....  At the very least all those programs would
have to have been tested.

I'm really glad that RedHat backports the fixes, cause I would be caught
between a rock and a hard place if I had to make a choice between 
changing the openssl lib version on a production server or having
a known hole in my SSHd.  I feel confident knowing that any potential
bug I am introducing is limited to the program that would be vulnerable
without the fix, rather than making a sweeping change that could
introduce *new* bugs to all kinds of other apps I have on my box.

-Ben.




-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to