Linux Security
    Linux Security
    Linux Security

    Debian: 'openssh' missing PAM support

    Date
    2643
    Posted By
    A former security upload of OpenSSH lacked support for PAM which leadinto people not being able to log in into their server. This was onlya problem on the sparc architecture.
    
    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ----------------------------------------------------------------------------
    Debian Security Advisory DSA-025-1                       This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                               Martin Schulze
    January 28, 2001
    - ----------------------------------------------------------------------------
    
    Package        : openssh
    Vulnerability  : Missing PAM support
    Debian-specific: yes
    
    A former security upload of OpenSSH lacked support for PAM which lead
    into people not being able to log in into their server.  This was only
    a problem on the sparc architecture.
    
    We recommend you upgrade your ssh packages on sparc.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 2.2 alias potato
    - ------------------------------------
    
      Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
      architectures.  This is only a recompile for the sparc architecture
      and thus no new source and no other binary packages are provided
    
    
      Sun Sparc architecture:
    
         https://security.debian.org/dists/stable/updates/main/binary-sparc/ssh_1.2.3-9.2_sparc.deb
          MD5 checksum: 41fe81f3eb8e87741b2a1c5bc913eab4
         https://security.debian.org/dists/stable/updates/main/binary-sparc/ssh-askpass-gnome_1.2.3-9.2_sparc.deb
          MD5 checksum: 5a3201c862319b986daf4c3654be73cc
    
    
      These files will be moved into
       ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    - ----------------------------------------------------------------------------
    For apt-get: deb  https://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  https://packages.debian.org/
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.4 (GNU/Linux)
    Comment: For info see  https://www.gnupg.org
    
    iD8DBQE6dAT7W5ql+IAeqTIRAiSRAJ92uZ/dJkrHCcqKyiEJB23nFSX+qQCgghpr
    NxiE8fYBTUDzAEo+QfDJdiw=
    =fBWQ
    -----END PGP SIGNATURE-----
    
    
    
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.