lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 22 Feb 2019 20:05:53 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4377-3] rssh security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4377-3                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 22, 2019                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : rssh
CVE ID         : CVE-2019-1000018
Debian Bug     : 919623

The restrictions introduced in the security fix to address
CVE-2019-1000018 also disallowed the -pf and -pt options which are used
by the scp support in libssh2. This update restores support for those.

For the stable distribution (stretch), this problem has been fixed in
version 2.3.4-5+deb9u4.

We recommend that you upgrade your rssh packages.

For the detailed security status of rssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rssh

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlxwVaMACgkQEMKTtsN8
TjYMOg//cbgyFXUvDrbsyjv/+9DEZrL4CwmxWcpDmCWOsl8YlXU677DN3IRnjpdf
VaKXXsGcCp6DJk7SJE3BK9v/9UPWBz8e+SgMRZfhCu6GjTy1aF3ip6zlF83aAHD6
X2AbfhN23SZBZB8qXcwXHw/wibTbQAHHJ5KW2JcHyL24gPA/2TxTLDE2L80NSDWC
l2Xd7CALFr2foKQ1rhxGB84tiuhCjhnG2VseMik/r3YdVSO2QPqAjpFBNEg9X8TR
T3JH5Czang8gXZ7nwLWtproxRBcM7jK+b2zaHwCQNyPQhQpB2MgsTWpw210zHvhi
f9X4LbOXVka4P376PFRaHAazbxK17nBQRM9dEweAGtxCuXyDgWZAHHNlSxJIDX9F
WygSzj/rsE0TTVa1yUN1sABGD4UWpYPNyqD+NtZzcaIrK0vfr3Z5A3coTQagpEc3
g4fsxAioKxLXSAcVEtCtCAX8/YLuR9K1bE6bRJk54W9sKLdmsMC021+L8K4+UB4Q
CbJsE24zeM8f62sMBobAKys9UHYk7AqAiHPHGUdKRaBymtjaOwDjLn1pG+BhuQbQ
RJJjodKO/w5EcT3oeZ6RKny59I/f4c35qqoT1NGZ+i0u1SNeUrRV9L6wFcJsL34b
cDT0cTN9SUyf5egAwDQt2tofmXUp5+Mp/5KJCZbHfqSINEKhlw4=
=XoNn
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ