lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190222200553.b2lkfiwigco4rsqf@seger.debian.org> Date: Fri, 22 Feb 2019 20:05:53 +0000 From: Moritz Muehlenhoff <jmm@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 4377-3] rssh security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4377-3 security@...ian.org https://www.debian.org/security/ Moritz Muehlenhoff February 22, 2019 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : rssh CVE ID : CVE-2019-1000018 Debian Bug : 919623 The restrictions introduced in the security fix to address CVE-2019-1000018 also disallowed the -pf and -pt options which are used by the scp support in libssh2. This update restores support for those. For the stable distribution (stretch), this problem has been fixed in version 2.3.4-5+deb9u4. We recommend that you upgrade your rssh packages. For the detailed security status of rssh please refer to its security tracker page at: https://security-tracker.debian.org/tracker/rssh Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlxwVaMACgkQEMKTtsN8 TjYMOg//cbgyFXUvDrbsyjv/+9DEZrL4CwmxWcpDmCWOsl8YlXU677DN3IRnjpdf VaKXXsGcCp6DJk7SJE3BK9v/9UPWBz8e+SgMRZfhCu6GjTy1aF3ip6zlF83aAHD6 X2AbfhN23SZBZB8qXcwXHw/wibTbQAHHJ5KW2JcHyL24gPA/2TxTLDE2L80NSDWC l2Xd7CALFr2foKQ1rhxGB84tiuhCjhnG2VseMik/r3YdVSO2QPqAjpFBNEg9X8TR T3JH5Czang8gXZ7nwLWtproxRBcM7jK+b2zaHwCQNyPQhQpB2MgsTWpw210zHvhi f9X4LbOXVka4P376PFRaHAazbxK17nBQRM9dEweAGtxCuXyDgWZAHHNlSxJIDX9F WygSzj/rsE0TTVa1yUN1sABGD4UWpYPNyqD+NtZzcaIrK0vfr3Z5A3coTQagpEc3 g4fsxAioKxLXSAcVEtCtCAX8/YLuR9K1bE6bRJk54W9sKLdmsMC021+L8K4+UB4Q CbJsE24zeM8f62sMBobAKys9UHYk7AqAiHPHGUdKRaBymtjaOwDjLn1pG+BhuQbQ RJJjodKO/w5EcT3oeZ6RKny59I/f4c35qqoT1NGZ+i0u1SNeUrRV9L6wFcJsL34b cDT0cTN9SUyf5egAwDQt2tofmXUp5+Mp/5KJCZbHfqSINEKhlw4= =XoNn -----END PGP SIGNATURE-----
Powered by blists - more mailing lists