User: Password:
Subscribe / Log in / New account

Fedora alert FEDORA-2014-6380 (openssh)

Subject:  [SECURITY] Fedora 20 Update: openssh-6.4p1-4.fc20
Date:  Wed, 21 May 2014 23:23:52 +0000
Message-ID:  <>

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2014-6380 2014-05-16 08:56:05 -------------------------------------------------------------------------------- Name : openssh Product : Fedora 20 Version : 6.4p1 Release : 4.fc20 URL : Summary : An open source implementation of SSH protocol versions 1 and 2 Description : SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. -------------------------------------------------------------------------------- Update Information: - environment variables with embedded '=' or '\0' characters are now ignored - prevents a server from skipping SSHFP lookup and forcing a new-hostkey dialog by offering only certificate keys - ssh-agent is now suspend-aware as it gets also CLOCK_BOOTTIME time - /etc/ssh/moduli is readable by all now - sshd-keygen.service depends on existence of /etc/ssh/ssh_host_ecdsa_key instead of /etc/ssh/ssh_host_dsa_key by default - ssh-copy-id is run in so called legacy mode when SSH_COPY_ID_LEGACY variable is set -------------------------------------------------------------------------------- ChangeLog: * Thu May 15 2014 Petr Lautrbach <> 6.4p1-4 + 0.9.3-1 - use SSH_COPY_ID_LEGACY variable to run ssh-copy-id in the legacy mode - make /etc/ssh/moduli file public (#1043661) - test existence of /etc/ssh/ssh_host_ecdsa_key in sshd-keygen.service - don't clean up gssapi credentials by default (#1055016) - ssh-agent - try CLOCK_BOOTTIME with fallback (#1091992) - prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338) - ignore environment variables with embedded '=' or '\0' characters - CVE-2014-2532 (#1077843) * Wed Dec 11 2013 Petr Lautrbach <> 6.4p1-3 + 0.9.3-1 - sshd-keygen - use correct permissions on ecdsa host key (#1023945) - use only rsa and ecdsa host keys by default * Tue Nov 26 2013 Petr Lautrbach <> 6.4p1-2 + 0.9.3-1 - fix fatal() cleanup in the audit patch (#1029074) - fix parsing logic of ldap.conf file (#1033662) * Fri Nov 8 2013 Petr Lautrbach <> 6.4p1-1 + 0.9.3-1 - new upstream release -------------------------------------------------------------------------------- References: [ 1 ] Bug #1081338 - CVE-2014-2653 openssh: failure to check DNS SSHFP records in certain scenarios [ 2 ] Bug #1077843 - CVE-2014-2532 openssh: AcceptEnv environment restriction bypass flaw -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update openssh' at the command line. For more information, refer to "Managing Software with yum", available at All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds