[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030923202537.5E3BA9FBC8@noc.internal.fairytale.se>
Date: Tue, 23 Sep 2003 22:25:37 +0200 (CEST)
From: aliz@...too.org (Daniel Ahlberg)
To: gentoo-announce@...too.org, bugtraq@...urityfocus.com,
full-disclosure@...ts.netsys.com
Subject: GLSA: openssh (200309-14)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-14
- - - ---------------------------------------------------------------------
PACKAGE : openssh
SUMMARY : multiple vulnerabilities in new PAM code
DATE : 2003-09-23 20:25 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <openssh-3.7.1_p2
FIXED VERSION : >=openssh-3.7.1_p2
CVE :
- - - ---------------------------------------------------------------------
quote from advisory:
"Portable OpenSSH versions 3.7p1 and 3.7.1p1 contain multiple
vulnerabilities in the new PAM code. At least one of these bugs
is remotely exploitable (under a non-standard configuration,
with privsep disabled)."
read the full advisory at:
http://www.openssh.com/txt/sshpam.adv
SOLUTION
It is recommended that all Gentoo Linux users who are running
net-misc/openssh upgrade to openssh-3.7.1_p2 as follows:
emerge sync
emerge openssh
emerge clean
- - - ---------------------------------------------------------------------
aliz@...too.org - GnuPG key is available at http://dev.gentoo.org/~aliz
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/cKxBfT7nyhUpoZMRAmw0AJ92FPN0+E9Sm30c8B8rjF31/gQ7UwCcCWmi
ZSsCQAtKpTlq4M/KTdfMQ5M=
=mEO/
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists