Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20230721121019.GB25354@localhost.localdomain>
Date: Fri, 21 Jul 2023 12:10:31 +0000
From: Qualys Security Advisory <qsa@...lys.com>
To: Demi Marie Obenour <demi@...isiblethingslab.com>
CC: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: Re: Announce: OpenSSH 9.3p2 released

Hi,

On Thu, Jul 20, 2023 at 09:22:08PM -0400, Demi Marie Obenour wrote:
> IMO the root cause of this problem is that PKCS#11 libraries are installed
> in /usr/lib, rather than in /usr/lib/pkcs11 or another subdirectory.
> There should be an automated way to check if a library is a PKCS#11
> library without having to load it.

Wednesday's release was a security-only release, the two patches it
contains are very simple, unlikely to break any existing installation,
and one of these patches at least (the s/error/fatal/ one) is very easy
to backport.

But the OpenSSH developers have done an amazing job and have not only
prepared these security-only patches, they have also prepared two more
defense-in-depth patches (which are more intrusive and therefore need
testing by the community first):

https://github.com/openssh/openssh-portable/commit/29ef8a04866ca14688d5b7fed7b8b9deab851f77
https://github.com/openssh/openssh-portable/commit/099cdf59ce1e72f55d421c8445bf6321b3004755

The first one of these patches is probably what you are looking for
("check if a library is a PKCS#11 library without having to load it").

Thanks again to the OpenSSH developers for their incredible work! With
best regards,

-- 
the Qualys Security Advisory team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.