Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in openssh
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in openssh
ID: FEDORA-2014-6569
Distribution: Fedora
Plattformen: Fedora 19
Datum: Di, 10. Juni 2014, 07:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
Applikationen: OpenSSH

Originalnachricht

Name        : openssh
Product : Fedora 19
Version : 6.2p2
Release : 8.fc19
URL : http://www.openssh.com/portable.html
Summary : An open source implementation of SSH protocol versions 1 and 2
Description :
SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.

-------------------------------------------------------------------------------
-
Update Information:

- environment variables with embedded '=' or '0' characters
are now ignored
- prevents a server from skipping SSHFP lookup and forcing a new-hostkey
dialog by offering only certificate keys
- /etc/ssh/moduli is readable by all now
- ssh-copy-id is run in so called legacy mode when SSH_COPY_ID_LEGACY variable
is set

-------------------------------------------------------------------------------
-
ChangeLog:

* Mon May 19 2014 Petr Lautrbach <plautrba@redhat.com> 6.2p2-8 + 0.9.3-5
- fix fatal() cleanup in the audit patch (#1029074)
- fix parsing logic of ldap.conf file (#1033662)
- use SSH_COPY_ID_LEGACY variable to run ssh-copy-id in the legacy mode
- make /etc/ssh/moduli file public (#1043661)
- prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338)
- ignore environment variables with embedded '=' or '\0'
characters - CVE-2014-2532
(#1077843)
* Wed Dec 11 2013 Petr Lautrbach <plautrba@redhat.com> 6.2p2-7 + 0.9.3-5
- sshd-keygen - use correct permissions on ecdsa host key (#1023945)
* Mon Nov 18 2013 Petr Lautrbach <plautrba@redhat.com> 6.2p2-6 + 0.9.3-5
- increase the size of the Diffie-Hellman groups (#1010607)
- sshd-keygen to generate ECDSA keys <i.grok@comcast.net> (#1019222)
* Wed Jul 31 2013 Petr Lautrbach <plautrba@redhat.com> 6.2p2-5 + 0.9.3-5
- gssapi credentials need to be stored before a pam session opened (#987792)
* Tue Jul 23 2013 Petr Lautrbach <plautrba@redhat.com> 6.2p2-4 + 0.9.3-5
- don't show Success for EAI_SYSTEM (#985964)
- make sftp's libedit interface marginally multibyte aware (#841771)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1081338 - CVE-2014-2653 openssh: failure to check DNS SSHFP
records in certain scenarios
https://bugzilla.redhat.com/show_bug.cgi?id=1081338
[ 2 ] Bug #1077843 - CVE-2014-2532 openssh: AcceptEnv environment restriction
bypass flaw
https://bugzilla.redhat.com/show_bug.cgi?id=1077843
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update openssh' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung