|
|
Subscribe / Log in / New account

Ubuntu alert USN-2164-1 (openssh)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2164-1] OpenSSH vulnerability
Date:  Mon, 07 Apr 2014 15:25:25 -0400
Message-ID:  <5342FBA5.4090300@canonical.com>

========================================================================== Ubuntu Security Notice USN-2164-1 April 07, 2014 openssh vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.10 - Ubuntu 12.10 - Ubuntu 12.04 LTS Summary: A malicious server could bypass OpenSSH SSHFP DNS record checking. Software Description: - openssh: secure shell (SSH) for secure access to remote machines Details: Matthew Vernon discovered that OpenSSH did not correctly check SSHFP DNS records if a server presented an unacceptable host certificate. A malicious server could use this issue to disable SSHFP checking. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.10: openssh-client 1:6.2p2-6ubuntu0.3 Ubuntu 12.10: openssh-client 1:6.0p1-3ubuntu1.2 Ubuntu 12.04 LTS: openssh-client 1:5.9p1-5ubuntu1.3 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2164-1 CVE-2014-2653 Package Information: https://launchpad.net/ubuntu/+source/openssh/1:6.2p2-6ubu... https://launchpad.net/ubuntu/+source/openssh/1:6.0p1-3ubu... https://launchpad.net/ubuntu/+source/openssh/1:5.9p1-5ubu... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds