| Summary: | openssh new security issue CVE-2014-2653 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | cjwatson, mageia, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/593604/ | ||
| Whiteboard: | MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok | ||
| Source RPM: | openssh-6.2p2-3.1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-04-07 23:27:06 CEST
David Walser
2014-04-07 23:27:23 CEST
Whiteboard:
(none) =>
MGA3TOO No PoC. Testing complete mga4 32 & 64 Just used ssh to connect from one to the other and back again. Whiteboard:
MGA3TOO =>
MGA3TOO has_procedure mga4-32-ok mga4-64-ok Testing complete mga3 32 & 64 Whiteboard:
MGA3TOO has_procedure mga4-32-ok mga4-64-ok =>
MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok Advisory uploaded. Validating. Could sysadmin please push to 3 & 4 updates Thanks Keywords:
(none) =>
validated_update http://advisories.mageia.org/MGASA-2014-0166.html Status:
NEW =>
RESOLVED It's not correct that this bug was fixed upstream in 6.6p1. We discovered it in Debian and (after consultation with upstream) pushed a fix together with our first upload of 6.6p1; but 6.6p1 itself doesn't contain the fix. Therefore I believe Cauldron is in fact still vulnerable. CC:
(none) =>
cjwatson (In reply to Colin Watson from comment #5) > It's not correct that this bug was fixed upstream in 6.6p1. We discovered > it in Debian and (after consultation with upstream) pushed a fix together > with our first upload of 6.6p1; but 6.6p1 itself doesn't contain the fix. > Therefore I believe Cauldron is in fact still vulnerable. Thanks for letting us know! I'll grab the patch and apply it later today. (In reply to David Walser from comment #6) > (In reply to Colin Watson from comment #5) > > It's not correct that this bug was fixed upstream in 6.6p1. We discovered > > it in Debian and (after consultation with upstream) pushed a fix together > > with our first upload of 6.6p1; but 6.6p1 itself doesn't contain the fix. > > Therefore I believe Cauldron is in fact still vulnerable. > > Thanks for letting us know! I'll grab the patch and apply it later today. Done. Thanks again! |