Sicherheit: Ausführen beliebiger Kommandos in openssh
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in openssh
ID: FEDORA-2015-0837
Distribution: Fedora
Plattformen: Fedora 21
Datum: So, 18. Januar 2015, 11:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9278
Applikationen: OpenSSH


Name        : openssh
Product : Fedora 21
Version : 6.6.1p1
Release : 11.1.fc21
URL : http://www.openssh.com/portable.html
Summary : An open source implementation of SSH protocol versions 1 and 2
Description :
SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.

Update Information:

This update contains several bug fixes including sftp subsystem, scp program,
ldap extension and configuration parser. Also there is new option GSSAPIEnablek5users solving CVE-2014-9278.

* Thu Jan 15 2015 Jakub Jelen <jjelen@redhat.com> 6.6.1p1-11.1 + 0.9.3-3
- error message if scp when directory doesn't exist (#1142223)
- parsing configuration file values (#1130733)
- documentation in service and socket files for systemd (#1181593)
- updated ldap patch (#981058)
- fixed vendor-patchlevel
- add new option GSSAPIEnablek5users and disable using ~/.k5users by default
CVE-2014-9278 (#1170745)
* Fri Dec 19 2014 Petr Lautrbach <plautrba@redhat.com> 6.6.1p1-10 +
- log via monitor in chroots without /dev/log
* Wed Dec 3 2014 Petr Lautrbach <plautrba@redhat.com> 6.6.1p1-9 +
- the .local domain example should be in ssh_config, not in sshd_config
- use different values for DH for Cisco servers (#1026430)

[ 1 ] Bug #1142223 - scp gives wrong errormessage: "Is a directory"
[ 2 ] Bug #1130733 - SELinux is preventing /usr/sbin/sshd from
'name_bind' accesses on the tcp_socket .
[ 3 ] Bug #1181593 - No Documentation= line in the sshd.service file
[ 4 ] Bug #981058 - openssh-ldap ignores some configuration variables

This update can be installed with the "yum" update program. Use
su -c 'yum update openssh' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten