* OpenSSH client bug CVE-2016-0777
@ 2016-01-14 17:56 Michael Tremer
2016-01-14 19:44 ` Matthias Fischer
2016-01-15 16:44 ` Matthias Fischer
0 siblings, 2 replies; 5+ messages in thread
From: Michael Tremer @ 2016-01-14 17:56 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 284 bytes --]
Hello Matthias,
hello list,
could you please update OpenSSH to the latest version to fix the latest
security bugs:
http://www.undeadly.org/cgi?action=article&sid=20160114142733
It should not be anything difficult, but should be patched in IPFire
today if we can.
Best,
-Michael
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: OpenSSH client bug CVE-2016-0777
2016-01-14 17:56 OpenSSH client bug CVE-2016-0777 Michael Tremer
@ 2016-01-14 19:44 ` Matthias Fischer
2016-01-15 16:44 ` Matthias Fischer
1 sibling, 0 replies; 5+ messages in thread
From: Matthias Fischer @ 2016-01-14 19:44 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 442 bytes --]
On 14.01.2016 18:56, Michael Tremer wrote:
> Hello Matthias,
Hi,
> hello list,
>
> could you please update OpenSSH to the latest version to fix the latest
> security bugs:
>
> http://www.undeadly.org/cgi?action=article&sid=20160114142733
>
> It should not be anything difficult, but should be patched in IPFire
> today if we can.
>
> Best,
> -Michael
>
Work in progress...
But it will take until ~6 or 7pm tomorrow...
Best,
Matthias
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: OpenSSH client bug CVE-2016-0777
2016-01-14 17:56 OpenSSH client bug CVE-2016-0777 Michael Tremer
2016-01-14 19:44 ` Matthias Fischer
@ 2016-01-15 16:44 ` Matthias Fischer
1 sibling, 0 replies; 5+ messages in thread
From: Matthias Fischer @ 2016-01-15 16:44 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 168 bytes --]
Hi,
On 14.01.2016 18:56, Michael Tremer wrote:
> could you please update OpenSSH to the latest version to fix the latest
> security bugs...
Done. ;-)
Best,
Matthias
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: OpenSSH client bug CVE-2016-0777
2016-01-17 19:16 ` Michael Tremer
@ 2016-01-17 19:24 ` Matthias Fischer
0 siblings, 0 replies; 5+ messages in thread
From: Matthias Fischer @ 2016-01-17 19:24 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 408 bytes --]
On 17.01.2016 20:16, Michael Tremer wrote:
> An update to what? Like binary? Probably not because we want to have a
> defined state of the machines. So when people install Core Update X, we
> should be sure that there is actually the full set of software
> installed and running.
Thats an argument. ACK.
>> > ...
> ...
> P.S. Don't forget to CC the list.
*Hrm*! *Cough*! Of course... ;-)
Best,
Matthias
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: OpenSSH client bug CVE-2016-0777
[not found] <569B6B61.7050905@ipfire.org>
@ 2016-01-17 19:16 ` Michael Tremer
2016-01-17 19:24 ` Matthias Fischer
0 siblings, 1 reply; 5+ messages in thread
From: Michael Tremer @ 2016-01-17 19:16 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1257 bytes --]
Hi,
On Sun, 2016-01-17 at 11:22 +0100, Matthias Fischer wrote:
> Hi Michael,
>
> On 14.01.2016 18:56, Michael Tremer wrote:
> > could you please update OpenSSH to the latest version to fix the
> > latest
> > security bugs:
> >
> > http://www.undeadly.org/cgi?action=article&sid=20160114142733
> >
> > It should not be anything difficult, but should be patched in
> > IPFire
> > today if we can.
>
> Since there was no further feedback on this and because I don't know
> exactly, when the next update will be ready (or if the patch came too
> late?):
Nah the patch is alright. Also merged.
> Would it make sense, if I offer an update on the list - to those
> which
> are interested in testing it - the same way as 'dnsmasq 2.75'?
An update to what? Like binary? Probably not because we want to have a
defined state of the machines. So when people install Core Update X, we
should be sure that there is actually the full set of software
installed and running.
>
> Its running without seen problems here since 15.01.2016 / ~6pm. ;-)
>
> Package is at the usual place:
> http://people.ipfire.org/~mfischer/openssh-7.1p2-for-ipfire.tar.gz
> MD5: 6b8d0a7abd429014a942bad6371f2cf4
>
> Best,
> Matthias
-Michael
P.S. Don't forget to CC the list.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2016-01-17 19:24 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-01-14 17:56 OpenSSH client bug CVE-2016-0777 Michael Tremer
2016-01-14 19:44 ` Matthias Fischer
2016-01-15 16:44 ` Matthias Fischer
[not found] <569B6B61.7050905@ipfire.org>
2016-01-17 19:16 ` Michael Tremer
2016-01-17 19:24 ` Matthias Fischer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox