Fedora 20 Update: openssh-6.4p1-6.fc20

updates at fedoraproject.org updates at fedoraproject.org
Sat Nov 15 09:23:50 UTC 2014


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2014-14849
2014-11-13 16:52:18
--------------------------------------------------------------------------------

Name        : openssh
Product     : Fedora 20
Version     : 6.4p1
Release     : 6.fc20
URL         : http://www.openssh.com/portable.html
Summary     : An open source implementation of SSH protocol versions 1 and 2
Description :
SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's version of the last free version of SSH, bringing
it up to date in terms of security and features.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.

--------------------------------------------------------------------------------
Update Information:

This update cotains backported fixes from f21 and corrects the calculation of bytes for authctxt->krb5_ccname. It also fixes banner output to show utf8 symbols.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 11 2014 Petr Lautrbach <plautrba at redhat.com> 6.4p1-6 + 0.9.3-1
- correct the calculation of bytes for authctxt->krb5_ccname <ams at corefiling.com> (#1161073)
- change audit trail for unknown users (mindrot#2245)
- fix kuserok patch which checked for the existence of .k5login
  unconditionally and hence prevented other mechanisms to be used properly
- ignore SIGXFSZ in postauth monitor (mindrot#2263)
- set a client's address right after a connection is set (mindrot#2257)
- apply RFC3454 stringprep to banners when possible (mindrot#2058)
- don't consider a partial success as a failure (mindrot#2270)
* Fri Jul 18 2014 Petr Lautrbach <plautrba at redhat.com> 6.4p1-5 + 0.9.3-1
- standardise on NI_MAXHOST for gethostname() string lengths (#1051490)
* Thu May 15 2014 Petr Lautrbach <plautrba at redhat.com> 6.4p1-4 + 0.9.3-1
- use SSH_COPY_ID_LEGACY variable to run ssh-copy-id in the legacy mode
- make /etc/ssh/moduli file public (#1043661)
- test existence of /etc/ssh/ssh_host_ecdsa_key in sshd-keygen.service
- don't clean up gssapi credentials by default (#1055016)
- ssh-agent - try CLOCK_BOOTTIME with fallback (#1091992)
- prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338)
- ignore environment variables with embedded '=' or '\0' characters - CVE-2014-2532
  (#1077843)
* Wed Dec 11 2013 Petr Lautrbach <plautrba at redhat.com> 6.4p1-3 + 0.9.3-1
- sshd-keygen - use correct permissions on ecdsa host key (#1023945)
- use only rsa and ecdsa host keys by default
* Tue Nov 26 2013 Petr Lautrbach <plautrba at redhat.com> 6.4p1-2 + 0.9.3-1
- fix fatal() cleanup in the audit patch (#1029074)
- fix parsing logic of ldap.conf file (#1033662)
* Fri Nov  8 2013 Petr Lautrbach <plautrba at redhat.com> 6.4p1-1 + 0.9.3-1
- new upstream release
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1161073 - sshd sets KRB5CCNAME environment variable with a truncated value
        https://bugzilla.redhat.com/show_bug.cgi?id=1161073
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update openssh' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list