[slackware-security]  OpenSSH updated again (SSA:2003-260-01)

Upgraded OpenSSH 3.7.1p1 packages are available for Slackware
8.1, 9.0 and -current.  These fix additional buffer management
errors that were not corrected in the recent 3.7p1 release.
The possibility exists that these errors could allow a remote
exploit, so we recommend all sites running OpenSSH upgrade to
the new OpenSSH package immediately.


Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Wed Sep 17 01:25:22 PDT 2003
patches/packages/openssh-3.7.1p1-i386-1.tgz:  Upgraded to openssh-3.7.1p1.
  The OpenSSH advisory was updated  (http://www.openssh.com/txt/buffer.adv)
  and now says that you need at least version 3.7.1, which fixes some
  more buffer problems like those fixed by 3.7.
  (* Security fix *)
+--------------------------+


WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated package for Slackware 8.1: 
 

Updated package for Slackware 9.0: 
 

Updated package for Slackware -current: 
 


MD5 SIGNATURES:
+-------------+

Slackware 8.1 package:
c3b50ac3f2cd52c7ad10a0fbb141efe9  openssh-3.7.1p1-i386-1.tgz

Slackware 9.0 package:
0362f59c065c79c3eb733519394d0a60  openssh-3.7.1p1-i386-1.tgz

Slackware -current package:
e6e9cb0a9811f982d615e7a96c6c76e9  openssh-3.7.1p1-i486-1.tgz


INSTALLATION INSTRUCTIONS:
+------------------------+

(This procedure is safe to do while logged in through OpenSSH)

Upgrade using upgradepkg (as root):
# upgradepkg openssh-3.7.1p1-i386-1.tgz

Restart OpenSSH:
. /etc/rc.d/rc.sshd restart


+-----+

Slackware Linux Security Team 
slackware
security@slackware.com



Slackware: openssh buffer management errors

September 17, 2003
These packages fix additional buffer managementerrors that were not corrected in the recent 3.7p1 release.

Summary

Here are the details from the Slackware 9.0 ChangeLog: Wed Sep 17 01:25:22 PDT 2003 patches/packages/openssh-3.7.1p1-i386-1.tgz: Upgraded to openssh-3.7.1p1. The OpenSSH advisory was updated (http://www.openssh.com/txt/buffer.adv) and now says that you need at least version 3.7.1, which fixes some more buffer problems like those fixed by 3.7. (* Security fix *) WHERE TO FIND THE NEW PACKAGES: Updated package for Slackware 8.1: Updated package for Slackware 9.0: Updated package for Slackware -current: MD5 SIGNATURES: Slackware 8.1 package: c3b50ac3f2cd52c7ad10a0fbb141efe9 openssh-3.7.1p1-i386-1.tgz Slackware 9.0 package: 0362f59c065c79c3eb733519394d0a60 openssh-3.7.1p1-i386-1.tgz Slackware -current package: e6e9cb0a9811f982d615e7a96c6c76e9 openssh-3.7.1p1-i486-1.tgz INSTALLATION INSTRUCTIONS: (This procedure is safe to do while logged in through OpenSSH) Upgrade using upgradepkg (as root): # upgradepkg openssh-3.7.1p1-i386-1.tgz Restart OpenSSH: . /etc/rc.d/rc.sshd restart Slackware Linux Security Team slackware security@slackware.com

Where Find New Packages

MD5 Signatures

Severity
[slackware-security] OpenSSH updated again (SSA:2003-260-01)
Upgraded OpenSSH 3.7.1p1 packages are available for Slackware 8.1, 9.0 and -current. These fix additional buffer management errors that were not corrected in the recent 3.7p1 release. The possibility exists that these errors could allow a remote exploit, so we recommend all sites running OpenSSH upgrade to the new OpenSSH package immediately.

Installation Instructions

Related News