Linux Security
    Linux Security
    Linux Security

    Debian: 'openssh' wrong libSSL

    Date
    3090
    Posted By
    A former security upload of OpenSSH was linked against the wrongversion of libssl (providing an API to SSL), that version was notavailable on sparc.
    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ----------------------------------------------------------------------------
    Debian Security Advisory DSA-025-2                       This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                               Martin Schulze
    January 28, 2001
    - ----------------------------------------------------------------------------
    
    Package        : openssh
    Vulnerability  : Wrong libSSL
    Debian-specific: yes
    
    A former security upload of OpenSSH was linked against the wrong
    version of libssl (providing an API to SSL), that version was not
    available on sparc.  This ought to fix a former upload that lacked
    support for PAM which lead into people not being able to log in into
    their server.  This was only a problem on the sparc architecture.
    
    We recommend you upgrade your ssh packages on sparc.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 2.2 alias potato
    - ------------------------------------
    
      Potato was released for the alpha, arm, i386, m68k, powerpc and
      sparc architectures.  This is only a (though second) recompile for
      the sparc architecture and thus no new source and no other binary
      packages are provided
    
    
      Sun Sparc architecture:
    
         https://security.debian.org/dists/stable/updates/main/binary-sparc/ssh_1.2.3-9.3_sparc.deb
          MD5 checksum: 3e94a9e0fae272c73d94f8eebc12856b
         https://security.debian.org/dists/stable/updates/main/binary-sparc/ssh-askpass-gnome_1.2.3-9.3_sparc.deb
          MD5 checksum: 07f1d7d62c50f47f47061da201d20a2c
    
    
      These files will be moved into
       ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    - ----------------------------------------------------------------------------
    For apt-get: deb  https://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  https://packages.debian.org/
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.4 (GNU/Linux)
    Comment: For info see  https://www.gnupg.org
    
    iD8DBQE6dGWbW5ql+IAeqTIRAqNlAKCZD3+t9Mg7UR/5y5ELtEql/z8D0wCeNOta
    RgXUuwteoZU2K2tr5xqHTQU=
    =bcZr
    -----END PGP SIGNATURE-----
    
    
    
    
    

    Advisories

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"47","type":"x","order":"1","pct":83.93,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.07,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.