CVE-2014-2653

NameCVE-2014-2653
DescriptionThe verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2894-1
Debian Bugs742513

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssh (PTS)buster1:7.9p1-10+deb10u2fixed
buster (security)1:7.9p1-10+deb10u3fixed
bullseye1:8.4p1-5+deb11u2fixed
bookworm1:9.2p1-2+deb12u1fixed
trixie1:9.4p1-1fixed
sid1:9.5p1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensshsourcesqueeze1:5.5p1-6+squeeze5DSA-2894-1
opensshsourcewheezy1:6.0p1-4+deb7u1DSA-2894-1
opensshsource(unstable)1:6.6p1-1low742513

Search for package or bug name: Reporting problems