The regress test is failing when ran against -proposed for all archs (in
both cases for s390x), except for i386 (unmet dependencies, maybe not in
the i386-white-list). From the log, the fail is the same in all archs:

1800s 21:20:13.906172151 E: run test putty-transfer.sh ...
1801s 21:20:14.536962818 O: putty transfer data: compression 0
1802s 21:20:15.670433174 O: putty transfer data: compression 1
1803s 21:20:16.693499776 O: ok putty transfer data
1803s 21:20:16.695110678 E: run test putty-ciphers.sh ...
1804s 21:20:17.585923199 O: putty ciphers: cipher aes
1804s 21:20:17.709690365 O: putty ciphers: cipher 3des
1804s 21:20:17.835865215 O: putty ciphers: cipher aes128-ctr
1804s 21:20:17.965845061 O: putty ciphers: cipher aes192-ctr
1805s 21:20:18.098941298 O: putty ciphers: cipher aes256-ctr
1805s 21:20:18.232051575 O: putty ciphers: cipher chacha20
1805s 21:20:18.278267143 E: The client-to-server cipher selected for this 
session is
1805s 21:20:18.279841266 E: ChaCha20-Poly1305, which, with this server, is 
vulnerable to
1805s 21:20:18.281237545 E: the 'Terrapin' attack CVE-2023-48795, potentially 
allowing
1805s 21:20:18.282623086 E: an attacker to modify the encrypted session.
1805s 21:20:18.284017245 E: Upgrading, patching, or reconfiguring this SSH 
server is the
1805s 21:20:18.285366255 E: best way to avoid this vulnerability, if possible.
1805s 21:20:18.286856416 E: You can also avoid this vulnerability by abandoning 
this
1805s 21:20:18.288221535 E: connection, moving ChaCha20 to below the 'warn 
below here'
1805s 21:20:18.289585505 E: line in PuTTY's SSH cipher configuration (so that an
1805s 21:20:18.291007676 E: algorithm without the vulnerability will be 
selected), and
1805s 21:20:18.292345334 E: starting a new connection.
1805s 21:20:18.293771875 E: Connection abandoned.
1805s 21:20:18.295117553 E: FATAL ERROR: Cannot confirm a weak crypto primitive 
in batch mode
1805s 21:20:18.297391166 O: ssh cat 
/tmp/autopkgtest.8T5BlL/autopkgtest_tmp/user/regress/data failed
1805s 21:20:18.298429901 E: cmp: EOF on 
/tmp/autopkgtest.8T5BlL/autopkgtest_tmp/user/regress/copy which is empty
1805s 21:20:18.317523283 O: corrupted copy
1805s 21:20:18.319527121 O: failed putty ciphers
1805s 21:20:18.319434210 E: make: *** [Makefile:247: t-exec-interop] Error 1
1805s 21:20:18.320965722 O: make: Leaving directory 
'/tmp/autopkgtest.8T5BlL/autopkgtest_tmp/user/regress'
1805s 21:20:18.322307881 O: ==> 
/tmp/autopkgtest.8T5BlL/autopkgtest_tmp/user/regress/failed-regress.log <==

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-48795

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2049552

Title:
  [noble] ftbfs with new zlib 1.3

Status in openssh package in Ubuntu:
  In Progress

Bug description:
  The zlib detection code seems faulty:

  checking for possibly buggy zlib... yes
  configure: error: *** zlib too old - check config.log ***
  Your reported zlib version has known security problems.  It's possible your
  vendor has fixed these problems without changing the version number.  If you
  are sure this is the case, you can disable the check by running
  "./configure --without-zlib-version-check".
  If you are in doubt, upgrade zlib to version 1.2.3 or greater.
  See http://www.gzip.org/zlib/ for details.

  | #include <stdio.h>
  | #include <stdlib.h>
  | #include <zlib.h>
  |
  | int
  | main (void)
  | {
  |
  |   int a=0, b=0, c=0, d=0, n, v;
  |   n = sscanf(ZLIB_VERSION, "%d.%d.%d.%d", &a, &b, &c, &d);
  |   if (n != 3 && n != 4)
  |       exit(1);
  |   v = a*1000000 + b*10000 + c*100 + d;
  |   fprintf(stderr, "found zlib version %s (%d)\n", ZLIB_VERSION, v);
  |
  |   /* 1.1.4 is OK */
  |   if (a == 1 && b == 1 && c >= 4)
  |       exit(0);
  |
  |   /* 1.2.3 and up are OK */
  |   if (v >= 1020300)
  |       exit(0);
  |
  |   exit(2);
  |
  |   ;
  |   return 0;
  | }

  Upstream bug report: https://bugzilla.mindrot.org/show_bug.cgi?id=3604

  Upstream fix (untested): https://github.com/openssh/openssh-
  portable/commit/cb4ed12ffc332d1f72d054ed92655b5f1c38f621

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2049552/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to