lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20030502100313.B02FD33740@mail1.tamperd.net> From: aliz at gentoo.org (Daniel Ahlberg) Subject: GLSA: openssh (200305-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200305-01 - - - --------------------------------------------------------------------- PACKAGE : openssh SUMMARY : timing attack leads to information disclosure DATE : 2003-05-02 10:03 UTC EXPLOIT : remote VERSIONS AFFECTED : <openssh-3.6.1_p2 FIXED VERSION : >=openssh-3.6.1_p2 CVE : CAN-2003-0190 - - - --------------------------------------------------------------------- Mediaservice.net has discovered a bug in OpenSSH that allows attackers to identify valid users on vulnerable systems. Read the full advisory at http://lab.mediaservice.net/advisory/2003-01-openssh.txt SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/openssh upgrade to openssh-3.6.1_p2 as follows: emerge sync emerge openssh emerge clean - - - --------------------------------------------------------------------- aliz@...too.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+skJefT7nyhUpoZMRAt74AKCjytn9UHR9YILDL0eCwV18YaoP/gCgp1L/ H9P9IVPXLlIHsJWW9XXLfUk= =Yz9f -----END PGP SIGNATURE-----