News for package openssh

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 3.0 (quilt)
Source: openssh
Binary: openssh-client, openssh-server, ssh, ssh-krb5, ssh-askpass-gnome, openssh-client-udeb, openssh-server-udeb
Architecture: any all
Version: 1:6.0p1-4+deb7u1
Maintainer: Debian OpenSSH Maintainers <[email protected]>
Uploaders: Colin Watson <[email protected]>, Matthew Vernon <[email protected]>
Homepage: http://www.openssh.org/
Standards-Version: 3.8.4
Vcs-Browser: http://anonscm.debian.org/loggerhead/pkg-ssh/openssh/trunk
Vcs-Bzr: http://anonscm.debian.org/bzr/pkg-ssh/openssh/trunk
Build-Depends: libwrap0-dev | libwrap-dev, zlib1g-dev (>= 1:1.2.3-1), libssl-dev (>= 0.9.8g), libpam0g-dev | libpam-dev, libgtk2.0-dev, libedit-dev, debhelper (>= 7.4.2~), libselinux1-dev [linux-any], libkrb5-dev | heimdal-dev, dpkg (>= 1.16.1~)
Package-List: 
 openssh-client deb net standard
 openssh-client-udeb udeb debian-installer optional
 openssh-server deb net optional
 openssh-server-udeb udeb debian-installer optional
 ssh deb net extra
 ssh-askpass-gnome deb gnome optional
 ssh-krb5 deb oldlibs extra
Checksums-Sha1: 
 f691e53ef83417031a2854b8b1b661c9c08e4422 1126034 openssh_6.0p1.orig.tar.gz
 99482673ad9e7bf91e35b9b3dc33201c175f9938 250665 openssh_6.0p1-4+deb7u1.debian.tar.gz
Checksums-Sha256: 
 589d48e952d6c017e667873486b5df63222f9133d417d0002bd6429d9bd882de 1126034 openssh_6.0p1.orig.tar.gz
 30a48594c638462418d73399644fb83c463011f26847ffc73253740588511647 250665 openssh_6.0p1-4+deb7u1.debian.tar.gz
Files: 
 3c9347aa67862881c5da3f3b1c08da7b 1126034 openssh_6.0p1.orig.tar.gz
 61f070b4553533e7e32adb9c77b98475 250665 openssh_6.0p1-4+deb7u1.debian.tar.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Colin Watson <[email protected]> -- Debian developer
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=rxcv
-----END PGP SIGNATURE-----

Changes:
openssh (1:6.0p1-4+deb7u1) stable-security; urgency=high

  * CVE-2014-2532: Disallow invalid characters in environment variable names
    to prevent bypassing AcceptEnv wildcard restrictions.
  * CVE-2014-2653: Attempt SSHFP lookup even if server presents a
    certificate (closes: #742513).

 -- Colin Watson <[email protected]>  Thu, 03 Apr 2014 00:05:17 +0100