[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Ybo7s-0005De-L1@titan.mandriva.com>
Date: Sat, 28 Mar 2015 11:38:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2015:095 ] openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2015:095
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : openssh
Date : March 28, 2015
Affected: Business Server 2.0
_______________________________________________________________________
Problem Description:
Updated openssh packages fix security vulnerabilities:
sshd in OpenSSH before 6.6 does not properly support wildcards
on AcceptEnv lines in sshd_config, which allows remote attackers to
bypass intended environment restrictions by using a substring located
before a wildcard character (CVE-2014-2532).
Matthew Vernon reported that if a SSH server offers a HostCertificate
that the ssh client doesn't accept, then the client doesn't check
the DNS for SSHFP records. As a consequence a malicious server can
disable SSHFP-checking by presenting a certificate (CVE-2014-2653).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
http://advisories.mageia.org/MGASA-2014-0143.html
http://advisories.mageia.org/MGASA-2014-0166.html
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
4cdb04be31987117f5111e3e6571dc98 mbs2/x86_64/openssh-6.2p2-6.2.mbs2.x86_64.rpm
7ab96e3da3647c4e5209b2d9d24f8fdb mbs2/x86_64/openssh-askpass-6.2p2-6.2.mbs2.x86_64.rpm
6c8c44006180a82b4e5a9bbdebaecbba mbs2/x86_64/openssh-askpass-common-6.2p2-6.2.mbs2.x86_64.rpm
dcff6d34efa6fb0f9128420d78a65eaa mbs2/x86_64/openssh-askpass-gnome-6.2p2-6.2.mbs2.x86_64.rpm
0323b38edadf62dfa9b7d3ae7a4c01fe mbs2/x86_64/openssh-clients-6.2p2-6.2.mbs2.x86_64.rpm
ebc1702b94487b1164de4d4a57723cc6 mbs2/x86_64/openssh-ldap-6.2p2-6.2.mbs2.x86_64.rpm
24bf0a4c7fbd35b3638385e7b406d036 mbs2/x86_64/openssh-server-6.2p2-6.2.mbs2.x86_64.rpm
4a887cb49bdb4aa4677fd409f8a6d927 mbs2/SRPMS/openssh-6.2p2-6.2.mbs2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVFnasmqjQ0CJFipgRArqBAKDQxdvFitPWeNN8pj5JyGZDnnmTsACgvtsl
HCvZ0ewmoukeEWcbmRsuHtg=
=O2Up
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists