Skip to content

Commit

Permalink
openssh: Patch CVE-2016-8858
Browse files Browse the repository at this point in the history
Also add myself as a maintainer.

(cherry picked from commit 7374105)
  • Loading branch information
aneeshusa authored and sorokin committed Nov 12, 2016
1 parent 3bf5398 commit d4e38c0
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
3 changes: 2 additions & 1 deletion pkgs/tools/networking/openssh/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ stdenv.mkDerivation rec {
./RH-1380296-NEWKEYS-null-pointer-deref.patch
./locale_archive.patch
./fix-host-key-algorithms-plus.patch
./fix-CVE-2016-8858.patch
]
++ optional withGssapiPatches gssapiSrc;

Expand Down Expand Up @@ -89,7 +90,7 @@ stdenv.mkDerivation rec {
description = "An implementation of the SSH protocol";
license = stdenv.lib.licenses.bsd2;
platforms = platforms.unix;
maintainers = with maintainers; [ eelco ];
maintainers = with maintainers; [ eelco aneeshusa ];
broken = hpnSupport; # probably after 6.7 update
};
}
11 changes: 11 additions & 0 deletions pkgs/tools/networking/openssh/fix-CVE-2016-8858.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
diff -u -r1.126 -r1.127
--- ssh/kex.c 2016/09/28 21:44:52 1.126
+++ ssh/kex.c 2016/10/10 19:28:48 1.127
@@ -461,6 +461,7 @@
if (kex == NULL)
return SSH_ERR_INVALID_ARGUMENT;

+ ssh_dispatch_set(ssh, SSH2_MSG_KEXINIT, NULL);
ptr = sshpkt_ptr(ssh, &dlen);
if ((r = sshbuf_put(kex->peer, ptr, dlen)) != 0)
return r;

0 comments on commit d4e38c0

Please sign in to comment.