Contributed by jj on from the 5-ants-are-more-than-4.9-elephants. dept.
OpenSSH 5.0 has just been released. It will be available from the mirrors listed at www.openssh.com shortly.
The OpenBSD errata for the issue is here.
We apologise for any inconvenience resulting from this release being made so shortly after 4.9. Unfortunately we only learned of the below security issue from the public CVE report. The Debian OpenSSH maintainers responsible for handling the initial report of this bug failed to report it via either the private OpenSSH security contact list (email@example.com) or the portable OpenSSH Bugzilla (http://bugzilla.mindrot.org/).
We ask anyone wishing to report security bugs in OpenSSH to please use the firstname.lastname@example.org contact and to practice responsible disclosure.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots and purchased T-shirts or posters.
T-shirt, poster and CD sales directly support the project. Pictures and more information can be found at:
http://www.openbsd.org/tshirts.html and http://www.openbsd.org/orders.html
For international orders use https.openbsd.org/cgi-bin/order
and for European orders, use https.openbsd.org/cgi-bin/order.eu
Changes since OpenSSH 4.9: ============================ Security: * CVE-2008-1483: Avoid possible hijacking of X11-forwarded connections by refusing to listen on a port unless all address families bind successfully. Checksums: ========== - SHA1 (openssh-5.0.tar.gz) = 729fb3168edf6a68408223b5ed82e59d13b57c47 - SHA1 (openssh-5.0p1.tar.gz) = 121cea3a730c0b0353334b6f46f438de30ab4928 Reporting Bugs: =============== - please read http://www.openssh.com/report.html and http://bugzilla.mindrot.org/
OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and Ben Lindstrom.
(Comments are closed)