ELSA-2014-1552

ELSA-2014-1552 - openssh security, bug fix, and enhancement update

Type:SECURITY
Severity:MODERATE
Release Date:2014-10-15

Description


[5.3p1-104]
- ignore SIGXFSZ in postauth monitor child (#1133906)

[5.3p1-103]
- don't try to generate DSA keys in the init script in FIPS mode (#1118735)

[5.3p1-102]
- ignore SIGPIPE in ssh-keyscan (#1108836)

[5.3p1-101]
- ssh-add: fix fatal exit when removing card (#1042519)

[5.3p1-100]
- fix race in backported ControlPersist patch (#953088)

[5.3p1-99.2]
- skip requesting smartcard PIN when removing keys from agent (#1042519)

[5.3p1-98]
- add possibility to autocreate only RSA key into initscript (#1111568)
- fix several issues reported by coverity

[5.3p1-97]
- x11 forwarding - be less restrictive when can't bind to one of available addresses
(#1027197)
- better fork error detection in audit patch (#1028643)
- fix openssh-5.3p1-x11.patch for non-linux platforms (#1100913)

[5.3p1-96]
- prevent a server from skipping SSHFP lookup (#1081338) CVE-2014-2653
- ignore environment variables with embedded '=' or '\0' characters CVE-2014-2532
- backport ControlPersist option (#953088)
- log when a client requests an interactive session and only sftp is allowed (#997377)
- don't try to load RSA1 host key in FIPS mode (#1009959)
- restore Linux oom_adj setting when handling SIGHUP to maintain behaviour over restart
(#1010429)
- ssh-keygen -V - relative-specified certificate expiry time should be relative to current time
(#1022459)

[5.3p1-95]
- adjust the key echange DH groups and ssh-keygen according to SP800-131A (#993580)
- log failed integrity test if /etc/system-fips exists (#1020803)
- backport ECDSA and ECDH support (#1028335)


Related CVEs


CVE-2014-2532
CVE-2014-2653

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) openssh-5.3p1-104.el6.src.rpm958506d225fa015e95728da554ba22c0ELSA-2019-0711
openssh-5.3p1-104.el6.i686.rpm409bc3c0c5fdad58db8316fe6cadce41ELSA-2019-0711
openssh-askpass-5.3p1-104.el6.i686.rpm044c57e20ca91dc034ccaa40ce19ea55ELSA-2019-0711
openssh-clients-5.3p1-104.el6.i686.rpmd0ffb176630e98f695bf58dc8020c66eELSA-2019-0711
openssh-ldap-5.3p1-104.el6.i686.rpm9bd2239dbba7c64a3d66d59a6378a985ELSA-2019-0711
openssh-server-5.3p1-104.el6.i686.rpmc700d5f6d6e6f3f00e80ca9dd2b3a423ELSA-2019-0711
pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm06c4e72daaae21b848b553cbe7c32b2fELSA-2019-0711
Oracle Linux 6 (x86_64) openssh-5.3p1-104.el6.src.rpm958506d225fa015e95728da554ba22c0ELSA-2019-0711
openssh-5.3p1-104.el6.x86_64.rpm4abe4ebe86880e84f413d54f6506434dELSA-2019-0711
openssh-askpass-5.3p1-104.el6.x86_64.rpm5e4adf5adfec7622eba2ff5694515075ELSA-2019-0711
openssh-clients-5.3p1-104.el6.x86_64.rpm0286af4586d0cf6f81b3efe4d3352c83ELSA-2019-0711
openssh-ldap-5.3p1-104.el6.x86_64.rpm05ee05f568fb346791e6d0a4441481b7ELSA-2019-0711
openssh-server-5.3p1-104.el6.x86_64.rpm73b3290069c4551d25e2e650c9084799ELSA-2019-0711
pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm06c4e72daaae21b848b553cbe7c32b2fELSA-2019-0711
pam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpmf1e9da1ef210b8fd95f9f85c36e5243eELSA-2019-0711



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete