Patch for OS X: echo -e 'Host *\nUseRoaming no' >> ~/.ssh/config

On Thu, Jan 14, 2016 at 10:57 AM, Yves-Alexis Perez <cor...@debian.org>
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-3446-1                   secur...@debian.org
> https://www.debian.org/security/                        Yves-Alexis Perez
> January 14, 2016                      https://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : openssh
> CVE ID         : CVE-2016-0777 CVE-2016-0778
> Debian bug     : 810984
>
> The Qualys Security team discovered two vulnerabilities in the roaming
> code of the OpenSSH client (an implementation of the SSH protocol
> suite).
>
> SSH roaming enables a client, in case an SSH connection breaks
> unexpectedly, to resume it at a later time, provided the server also
> supports it.
>
> The OpenSSH server doesn't support roaming, but the OpenSSH client
> supports it (even though it's not documented) and it's enabled by
> default.
>
> CVE-2016-0777
>
>     An information leak (memory disclosure) can be exploited by a rogue
>     SSH server to trick a client into leaking sensitive data from the
>     client memory, including for example private keys.
>
> CVE-2016-0778
>
>     A buffer overflow (leading to file descriptor leak), can also be
>     exploited by a rogue SSH server, but due to another bug in the code
>     is possibly not exploitable, and only under certain conditions (not
>     the default configuration), when using ProxyCommand, ForwardAgent or
>     ForwardX11.
>
> This security update completely disables the roaming code in the OpenSSH
> client.
>
> It is also possible to disable roaming by adding the (undocumented)
> option 'UseRoaming no' to the global /etc/ssh/ssh_config file, or to the
> user configuration in ~/.ssh/config, or by passing -oUseRoaming=no on
> the command line.
>
> Users with passphrase-less privates keys, especially in non interactive
> setups (automated jobs using ssh, scp, rsync+ssh etc.) are advised to
> update their keys if they have connected to an SSH server they don't
> trust.
>
> More details about identifying an attack and mitigations will be
> available in the Qualys Security Advisory.
>
> For the oldstable distribution (wheezy), these problems have been fixed
> in version 1:6.0p1-4+deb7u3.
>
> For the stable distribution (jessie), these problems have been fixed in
> version 1:6.7p1-5+deb8u1.
>
> For the testing distribution (stretch) and unstable distribution (sid),
> these
> problems will be fixed in a later version.
>
> We recommend that you upgrade your openssh packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQEcBAEBCgAGBQJWl8KkAAoJEG3bU/KmdcClRNwH/0VVHlie4NzyktneCUYnPuU2
> WpeiJLScW+Sgn9ZfaL4LD+RlvmH19YLaKirIula1Wp+f6poAAMrE+Zh2ZO6wH1XY
> C3VG9mA3sZDkrgctKVqQ0jO9oY0kFsN8FbNduFH/qBycLZdsH6nQ1KyWRDuKfVql
> 4qJCoErmsc9w/Avlh/+WE7JFDRA+2TcGuXeHbmuSaxHAbR8+2PZ+4Z5xgUG/i7P2
> KeQkFTHBewn0fBQsQxIAgkwvV58eKNScGcgEMBrwKcwxcXDmWg4ST8KQLLZ+oQct
> mF1xWkNAnGNk6yfiGScv6TlY2JtVgfTTNN3gYjpbe/W4Wbqwp7xML90DRPzG7WQ=
> =MOdR
> -----END PGP SIGNATURE-----
>
>

Reply via email to