Debian 10360 Published by

Debian GNU/Linux has been updated with security updates for OpenSSH and pam-pkcs11:

[DSA 5868-1] openssh security update
[DLA 4057-1] openssh security update
[DLA 4058-1] pam-pkcs11 security update




[SECURITY] [DSA 5868-1] openssh security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5868-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 18, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openssh
CVE ID : CVE-2025-26465

The Qualys Threat Research Unit (TRU) discovered that the OpenSSH client
is vulnerable to a machine-in-the-middle attack if the VerifyHostKeyDNS
option is enabled (disabled by default).

Details can be found in the Qualys advisory at
https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt

For the stable distribution (bookworm), this problem has been fixed in
version 1:9.2p1-2+deb12u5.

We recommend that you upgrade your openssh packages.

For the detailed security status of openssh please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/openssh

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DLA 4057-1] openssh security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4057-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Colin Watson
February 18, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : openssh
Version : 1:8.4p1-5+deb11u4
CVE ID : CVE-2025-26465

The Qualys Threat Research Unit (TRU) discovered that the OpenSSH client
is vulnerable to a machine-in-the-middle attack if the VerifyHostKeyDNS
option is enabled (disabled by default).

Details can be found in the Qualys advisory at
https://www.qualys.com/2025/02/18/openssh-mitm-dos.txt

For Debian 11 bullseye, this problem has been fixed in version
1:8.4p1-5+deb11u4.

We recommend that you upgrade your openssh packages.

For the detailed security status of openssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssh

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4058-1] pam-pkcs11 security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4058-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
February 18, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : pam-pkcs11
Version : 0.6.11-4+deb11u1
CVE ID : CVE-2025-24032

A vulnerability was discovered in pam-pkcs11, a PAM module which
allows to use PKCS#11 based smart cards in the PAM authentication
stack, which may allow to bypass the authentication in some scenarios.

For Debian 11 bullseye, this problem has been fixed in version
0.6.11-4+deb11u1.

We recommend that you upgrade your pam-pkcs11 packages.

For the detailed security status of pam-pkcs11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pam-pkcs11

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS