On 12/04/2019 5:35 pm, Timothy Sipples wrote:
Paul Jodlowski wrote:
Currently OpenSSH is at 6.4p1, I have been asked by our
Network Security Team to upgrade to OpenSSH 7.4.
That's an "amusing" recommendation from your Network Security Team. Unless
security patches have been backported and applied to a particular
distribution of OpenSSH, OpenSSH 7.4p1 has at least three known security
vulnerabilities that I see: CVE-2018-15919, CVE-2018-15473, and
CVE-2017-15906.

So is your Network Security Team running around and getting lots of other
systems "updated" to an insecure release of OpenSSH (7.4), if those other
systems don't have backported security patches? Probably. Ooops.

As far as I can see those CVEs also apply to 6.4p1. How would you go about verifying that they had been fixed in z/OS ssh? Suggesting that their existence means that 7.4 is insecure (more so than 6.4p1) seems very misleading to me.

Looking at the CVE list, I can guess that the security team might be interested in the more severe CVEs applying to ssh before 7.4, e.g. CVE-2016-10010, CVE-2016-10012. How would you verify that the fixes are applied to z/OS 6.4p1? (Reading between the lines the changes sound significant enough to make backporting unlikely.)

Andrew Rowley

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to