You are here
Home > Preporuke > Sigurnosni propusti programskog paketa openssh

Sigurnosni propusti programskog paketa openssh

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-11067
2015-07-03 16:10:11
——————————————————————————–

Name : openssh
Product : Fedora 21
Version : 6.6.1p1
Release : 13.fc21
URL : http://www.openssh.com/portable.html
Summary : An open source implementation of SSH protocol versions 1 and 2
Description :
SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD’s version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.

——————————————————————————–
Update Information:

This update brings security fix for two announced vulnerabilities. Namely XSECURITY restrictions bypass under certain conditions AND weakness of agent locking (ssh-add -x) to password guessing (more info in related bugs). For more information see related bugs.
——————————————————————————–
ChangeLog:

* Wed Jul 1 2015 Jakub Jelen <jjelen@redhat.com> 6.6.1p1-13 + 0.9.3.3
– Security fixes released with openssh-6.9
– XSECURITY restrictions bypass under certain conditions in ssh(1) (#1238231)
– weakness of agent locking (ssh-add -x) to password guessing (#1238238)
– ssh-copy-id: tcsh doesnt work with multiline strings so we will make it uggly one-line
– Fix auditing when using combination of ForceCommand and PTY (#1203900)
– fix direction in CRYPTO_SESSION audit message
* Mon Mar 30 2015 Jakub Jelen <jjelen@redhat.com> 6.6.1p1-12 + 0.9.3-3
– Fix ssh-copy-id on non-sh shells (#1045191)
– Add tmpfiles.d entris (#1196807)
– Solve issue with ssh-copy-id and keys without trailing newline (#1093168)
– Remove unused patch
* Thu Jan 15 2015 Jakub Jelen <jjelen@redhat.com> 6.6.1p1-11.1 + 0.9.3-3
– error message if scp when directory doesn’t exist (#1142223)
– parsing configuration file values (#1130733)
– documentation in service and socket files for systemd (#1181593)
– updated ldap patch (#981058)
– fixed vendor-patchlevel
– add new option GSSAPIEnablek5users and disable using ~/.k5users by default CVE-2014-9278 (#1170745)
* Fri Dec 19 2014 Petr Lautrbach <plautrba@redhat.com> 6.6.1p1-10 + 0.9.3-3
– log via monitor in chroots without /dev/log
* Wed Dec 3 2014 Petr Lautrbach <plautrba@redhat.com> 6.6.1p1-9 + 0.9.3-3
– the .local domain example should be in ssh_config, not in sshd_config
– use different values for DH for Cisco servers (#1026430)
——————————————————————————–
References:

[ 1 ] Bug #1238238 – openssh: weakness of agent locking (ssh-add -x) to password guessing
https://bugzilla.redhat.com/show_bug.cgi?id=1238238
[ 2 ] Bug #1238231 – CVE-2015-5352 openssh: XSECURITY restrictions bypass under certain conditions in ssh(1)
https://bugzilla.redhat.com/show_bug.cgi?id=1238231
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openssh’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-11063
2015-07-03 16:10:03
——————————————————————————–

Name : openssh
Product : Fedora 22
Version : 6.9p1
Release : 1.fc22
URL : http://www.openssh.com/portable.html
Summary : An open source implementation of SSH protocol versions 1 and 2
Description :
SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD’s version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.

——————————————————————————–
Update Information:

This update brings security fix for two announced vulnerabilities. Namely XSECURITY restrictions bypass under certain conditions AND weakness of agent locking (ssh-add -x) to password guessing (more info in related bugs). It also provides new version of openssh-6.9 which is bringing many bugfixes and few new features with maintaining compatibility with previous version.
——————————————————————————–
ChangeLog:

* Wed Jul 1 2015 Jakub Jelen <jjelen@redhat.com> 6.9p1-1 + 0.9.3-6
– New upstream release (#1238253)
– Increase limitation number of files which can be listed using glob in sftp
– Correctly revert “PermitRootLogin no” option from upstream sources (#89216)
* Wed Jun 24 2015 Jakub Jelen <jjelen@redhat.com> 6.8p1-9 + 0.9.3-5
– Allow socketcall(SYS_SHUTDOWN) for net_child on ix86 architecture
* Thu Jun 18 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 6.8p1-8.1
– Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
* Mon Jun 8 2015 Jakub Jelen <jjelen@redhat.com> 6.8p1-8 + 0.9.3-5
– Return stat syscall to seccomp filter (#1228323)
* Wed Jun 3 2015 Jakub Jelen <jjelen@redhat.com> 6.8p1-7 + 0.9.3-5
– Handle pam_ssh_agent_auth memory, buffers and variable sizes (#1225106)
* Thu May 28 2015 Jakub Jelen <jjelen@redhat.com> 6.8p1-6 + 0.9.3-5
– Resolve problem with pam_ssh_agent_auth after rebase (#1225106)
– ssh-copy-id: tcsh doesnt work with multiline strings
– Fix upstream memory problems
– Add missing options in testmode output and manual pages
– Provide LDIF version of LPK schema
– Document required selinux boolean for working ssh-ldap-helper
——————————————————————————–
References:

[ 1 ] Bug #1238231 – CVE-2015-5352 openssh: XSECURITY restrictions bypass under certain conditions in ssh(1)
https://bugzilla.redhat.com/show_bug.cgi?id=1238231
[ 2 ] Bug #1238238 – openssh: weakness of agent locking (ssh-add -x) to password guessing
https://bugzilla.redhat.com/show_bug.cgi?id=1238238
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openssh’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
7e

AutorTomislav Protega
Cert idNCERT-REF-2015-07-0024-ADV
CveCVE-2014-9278 CVE-2015-5352
ID izvornikaFEDORA-2015-11067 FEDORA-2015-11063
Proizvodopenssh
Izvorhttp://www.redhat.com
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa libCapsiNetwork

Otkriven je sigurnosni nedostatak u programskom paketu libCapsiNetwork. Otkriveni nedostatak je uzrokovan preljevom spremnika i potencijalnim napadačima omogućuje izvođenje napada...

Close