Release date:
2024-07-04 11:50:32 UTC
Description:
- CVE-2024-6387: the signal handler race condition itself fixed by commenting
out the async-signal-unsafe code from the sshsigdie() function
Updated packages:
-
openssh-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
sha:15ea5b40e1a60fd0bdada5e04ab017a5abadf5b5
-
openssh-askpass-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
sha:40f0161ccb08b5f40672173847a0526a86982952
-
openssh-clients-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
sha:095b5cf73c37da015664a02a8f7b7e691a329278
-
openssh-keycat-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
sha:2749fcdcd3c22ab0bd508adb0e1d6a8c548550b2
-
openssh-server-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
sha:0c494700dffb08566047840a56f99cccc4668a82
-
openssh-sk-dummy-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
sha:223ac67cdfd959f65b05c0bca9926a6fc1b58b18
-
pam_ssh_agent_auth-0.10.4-5.30.el9_2.tuxcare.els5.x86_64.rpm
sha:ae156b8775693f0338609ce8340323bec160f379
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.