drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in openssh
Name: |
Ausführen beliebiger Kommandos in openssh |
|
ID: |
FEDORA-2015-0756 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
Di, 3. Februar 2015, 16:31 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9278 |
|
Applikationen: |
OpenSSH |
|
Originalnachricht |
Name : openssh Product : Fedora 20 Version : 6.4p1 Release : 8.fc20 URL : http://www.openssh.com/portable.html Summary : An open source implementation of SSH protocol versions 1 and 2 Description : SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel.
OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features.
This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both.
------------------------------------------------------------------------------- - Update Information:
This update contains backported fixes from f21, including sftp, scp, ldap and configuration file parsing. Also there is new option GSSAPIEnablek5users solving CVE-2014-9278. ------------------------------------------------------------------------------- - ChangeLog:
* Thu Jan 15 2015 Jakub Jelen <jjelen@redhat.com> 6.4p1-8 + 0.9.3-1 - error message if scp when directory doesn't exist (#1142223) - parsing configuration file values (#1130733) - documentation in service and socket files for systemd (#1181593) - updated ldap patch (#981058) - fixed vendor-patchlevel - add new option GSSAPIEnablek5users and disable using ~/.k5users by default CVE-2014-9278 (#1170745) - increase size of AUDIT_LOG_SIZE to 256 - backport fix for sftp prepending remote directory to relative symlinks (#825538) * Thu Dec 4 2014 Petr Lautrbach <plautrba@redhat.com> 6.4p1-7 + 0.9.3-1 - use different values for DH for Cisco servers (#1026430) * Tue Nov 11 2014 Petr Lautrbach <plautrba@redhat.com> 6.4p1-6 + 0.9.3-1 - correct the calculation of bytes for authctxt->krb5_ccname <ams@corefiling.com> (#1161073) - change audit trail for unknown users (mindrot#2245) - fix kuserok patch which checked for the existence of .k5login unconditionally and hence prevented other mechanisms to be used properly - ignore SIGXFSZ in postauth monitor (mindrot#2263) - set a client's address right after a connection is set (mindrot#2257) - apply RFC3454 stringprep to banners when possible (mindrot#2058) - don't consider a partial success as a failure (mindrot#2270) * Fri Jul 18 2014 Petr Lautrbach <plautrba@redhat.com> 6.4p1-5 + 0.9.3-1 - standardise on NI_MAXHOST for gethostname() string lengths (#1051490) * Thu May 15 2014 Petr Lautrbach <plautrba@redhat.com> 6.4p1-4 + 0.9.3-1 - use SSH_COPY_ID_LEGACY variable to run ssh-copy-id in the legacy mode - make /etc/ssh/moduli file public (#1043661) - test existence of /etc/ssh/ssh_host_ecdsa_key in sshd-keygen.service - don't clean up gssapi credentials by default (#1055016) - ssh-agent - try CLOCK_BOOTTIME with fallback (#1091992) - prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338) - ignore environment variables with embedded '=' or '\0' characters - CVE-2014-2532 (#1077843) * Wed Dec 11 2013 Petr Lautrbach <plautrba@redhat.com> 6.4p1-3 + 0.9.3-1 - sshd-keygen - use correct permissions on ecdsa host key (#1023945) - use only rsa and ecdsa host keys by default * Tue Nov 26 2013 Petr Lautrbach <plautrba@redhat.com> 6.4p1-2 + 0.9.3-1 - fix fatal() cleanup in the audit patch (#1029074) - fix parsing logic of ldap.conf file (#1033662) * Fri Nov 8 2013 Petr Lautrbach <plautrba@redhat.com> 6.4p1-1 + 0.9.3-1 - new upstream release ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1142223 - scp gives wrong errormessage: "Is a directory" https://bugzilla.redhat.com/show_bug.cgi?id=1142223 [ 2 ] Bug #1130733 - SELinux is preventing /usr/sbin/sshd from 'name_bind' accesses on the tcp_socket . https://bugzilla.redhat.com/show_bug.cgi?id=1130733 [ 3 ] Bug #1181593 - No Documentation= line in the sshd.service file https://bugzilla.redhat.com/show_bug.cgi?id=1181593 [ 4 ] Bug #981058 - openssh-ldap ignores some configuration variables https://bugzilla.redhat.com/show_bug.cgi?id=981058 [ 5 ] Bug #825538 - sftp: remote directory always prepended to relative symbolic links https://bugzilla.redhat.com/show_bug.cgi?id=825538 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update openssh' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|