Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Joost Pol found a bug in the channel code of all versions of OpenSSH
from 2.0 to 3.0.2. This bug can allow authenticated users with an
existing account on the vulnerable system to obtain root privilege or
by a malicious server attacking a vulnerable client. OpenSSH 3.1 is
not vulnerable to this problem. The provided packages fix this
vulnerability.
Updated Packages |
Mandrakelinux 7.1
bc34824969b478a98a5a5a76d8be06b5 7.1/RPMS/openssh-3.0.2p1-1.7mdk.i586.rpm 429ebe6c85060b520768175f1b739743 7.1/RPMS/openssh-askpass-3.0.2p1-1.7mdk.i586.rpm 889aa64afb4602f5f170b8669b8008b0 7.1/RPMS/openssh-askpass-gnome-3.0.2p1-1.7mdk.i586.rpm 90607450de8453562bad9dbf45bb1f2d 7.1/RPMS/openssh-clients-3.0.2p1-1.7mdk.i586.rpm 333454f7b2a6b16eb67742ae93c08fce 7.1/RPMS/openssh-server-3.0.2p1-1.7mdk.i586.rpm 616f318fe1a6a4edb33f299f75916747 7.1/SRPMS/openssh-3.0.2p1-1.7mdk.src.rpm
Mandrakelinux 7.2
c14977e0a4b7298dd81ab19fdc88440b 7.2/RPMS/openssh-3.0.2p1-1.6mdk.i586.rpm 35a7b31ed5bda3881677daac6201ef01 7.2/RPMS/openssh-askpass-3.0.2p1-1.6mdk.i586.rpm a3dfd2f05699e31617e5f92805efbd01 7.2/RPMS/openssh-askpass-gnome-3.0.2p1-1.6mdk.i586.rpm 2312e6704c681a217542f18114e42975 7.2/RPMS/openssh-clients-3.0.2p1-1.6mdk.i586.rpm 26486934d611183d82f51f42e24bb1da 7.2/RPMS/openssh-server-3.0.2p1-1.6mdk.i586.rpm 93d28e0b0a54ba70a8948f8d099abcbd 7.2/SRPMS/openssh-3.0.2p1-1.6mdk.src.rpm
Mandrakelinux 8.0
0fd791ab728bfcc7fe0378b6b24f168c 8.0/RPMS/openssh-3.1p1-1.1mdk.i586.rpm 23873cfc4e6fc201fbcf4ae70c858256 8.0/RPMS/openssh-askpass-3.1p1-1.1mdk.i586.rpm c61377a9986bd903f7f965fc21db402e 8.0/RPMS/openssh-askpass-gnome-3.1p1-1.1mdk.i586.rpm 374702df268b15ce2d33b33916fdb0b0 8.0/RPMS/openssh-clients-3.1p1-1.1mdk.i586.rpm 56f2c487ae041ef662ac45f338f5c331 8.0/RPMS/openssh-server-3.1p1-1.1mdk.i586.rpm 15e3cdabaf6685e36f2a8c92cf8c68e9 8.0/SRPMS/openssh-3.1p1-1.1mdk.src.rpm
Mandrakelinux 8.0/PPC
6bb51cef03c8c1d6ff84ac8a46be74f4 ppc/8.0/RPMS/openssh-3.1p1-1.1mdk.ppc.rpm b655673634b667a27e0d67a49e44dfdc ppc/8.0/RPMS/openssh-askpass-3.1p1-1.1mdk.ppc.rpm e1d9f17730903e3c4d046d75d84bed52 ppc/8.0/RPMS/openssh-askpass-gnome-3.1p1-1.1mdk.ppc.rpm bf68372dfee08ecc606d4db37f559722 ppc/8.0/RPMS/openssh-clients-3.1p1-1.1mdk.ppc.rpm 3c3f67d6ed2bd85174aa9c2654f222bf ppc/8.0/RPMS/openssh-server-3.1p1-1.1mdk.ppc.rpm 15e3cdabaf6685e36f2a8c92cf8c68e9 ppc/8.0/SRPMS/openssh-3.1p1-1.1mdk.src.rpm
Mandrakelinux 8.1
44ff50aad9a9696ee747d201b9a3bd5f 8.1/RPMS/openssh-3.1p1-1.1mdk.i586.rpm a8d4315ed3b5fab0e8d8f3abcae36ce7 8.1/RPMS/openssh-askpass-3.1p1-1.1mdk.i586.rpm 4df4ec7a72c4c5dbda179799738b8bd7 8.1/RPMS/openssh-askpass-gnome-3.1p1-1.1mdk.i586.rpm a332044cf9eaeaaae0af923d55678e2b 8.1/RPMS/openssh-clients-3.1p1-1.1mdk.i586.rpm a2a39c0c29d0c3a7660d8c58023edbe4 8.1/RPMS/openssh-server-3.1p1-1.1mdk.i586.rpm 15e3cdabaf6685e36f2a8c92cf8c68e9 8.1/SRPMS/openssh-3.1p1-1.1mdk.src.rpm
Mandrakelinux 8.1/IA64
f885782f2ff38dc6a49cc72a2b9d7275 ia64/8.1/RPMS/openssh-3.1p1-1.1mdk.ia64.rpm d475cb384418532d86fbdf83833049c8 ia64/8.1/RPMS/openssh-askpass-3.1p1-1.1mdk.ia64.rpm eedf9742b96bcc09149b27b0bcd0eec9 ia64/8.1/RPMS/openssh-askpass-gnome-3.1p1-1.1mdk.ia64.rpm 92d50a697f93113791c45f0e92afb5d8 ia64/8.1/RPMS/openssh-clients-3.1p1-1.1mdk.ia64.rpm 088704726b7b77d6bee5f16df3eeba09 ia64/8.1/RPMS/openssh-server-3.1p1-1.1mdk.ia64.rpm 15e3cdabaf6685e36f2a8c92cf8c68e9 ia64/8.1/SRPMS/openssh-3.1p1-1.1mdk.src.rpm
Corporate Server 1.0.1
bc34824969b478a98a5a5a76d8be06b5 1.0.1/RPMS/openssh-3.0.2p1-1.7mdk.i586.rpm 429ebe6c85060b520768175f1b739743 1.0.1/RPMS/openssh-askpass-3.0.2p1-1.7mdk.i586.rpm 889aa64afb4602f5f170b8669b8008b0 1.0.1/RPMS/openssh-askpass-gnome-3.0.2p1-1.7mdk.i586.rpm 90607450de8453562bad9dbf45bb1f2d 1.0.1/RPMS/openssh-clients-3.0.2p1-1.7mdk.i586.rpm 333454f7b2a6b16eb67742ae93c08fce 1.0.1/RPMS/openssh-server-3.0.2p1-1.7mdk.i586.rpm 616f318fe1a6a4edb33f299f75916747 1.0.1/SRPMS/openssh-3.0.2p1-1.7mdk.src.rpm
References |
http://www.pine.nl/advisories/pine-cert-20020301.txt
http://marc.theaimsgroup.com/?l=bugtraq&m=101553908201861&w=2
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.