User: Password:
|
|
Subscribe / Log in / New account

Ubuntu alert USN-2014-1 (openssh)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2014-1] OpenSSH vulnerability
Date:  Fri, 08 Nov 2013 09:53:26 -0500
Message-ID:  <527CFAE6.8060905@canonical.com>
Archive-link:  Article, Thread

========================================================================== Ubuntu Security Notice USN-2014-1 November 08, 2013 openssh vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.10 Summary: OpenSSH could be made to run programs if it received specially crafted network traffic from an authenticated user. Software Description: - openssh: secure shell (SSH) client, for secure access to remote machines Details: Markus Friedl discovered that OpenSSH incorrectly handled memory when the AES-GCM cipher was used. A remote authenticated attacker could use this issue to execute arbitrary code as their user, possibly bypassing shell or command restrictions. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.10: openssh-server 1:6.2p2-6ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2014-1 CVE-2013-4548 Package Information: https://launchpad.net/ubuntu/+source/openssh/1:6.2p2-6ubu... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


(Log in to post comments)


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds