http://www.mandriva.com/en/
______________________________
Package : openssh
Date : March 28, 2015
Affected: Business Server 2.0
______________________________
Problem Description:
Updated openssh packages fix security vulnerabilities:
sshd in OpenSSH before 6.6 does not properly support wildcards
on AcceptEnv lines in sshd_config, which allows remote attackers to
bypass intended environment restrictions by using a substring located
before a wildcard character (CVE-2014-2532).
Matthew Vernon reported that if a SSH server offers a HostCertificate
that the ssh client doesn't accept, then the client doesn't check
the DNS for SSHFP records. As a consequence a malicious server can
disable SSHFP-checking by presenting a certificate (CVE-2014-2653).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
4cdb04be31987117f5111e3e6571dc
7ab96e3da3647c4e5209b2d9d24f8f
6c8c44006180a82b4e5a9bbdebaecb
dcff6d34efa6fb0f9128420d78a65e
0323b38edadf62dfa9b7d3ae7a4c01
ebc1702b94487b1164de4d4a57723c
24bf0a4c7fbd35b3638385e7b406d0
4a887cb49bdb4aa4677fd409f8a6d9
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą