[CLSA-2022:1671481339] openssh: Fix of 2 CVEs
Type:
security
Severity:
Moderate
Release date:
2022-12-19
Description:
- CVE-2019-6109: verify character encoding in progress display to avoid spoofing of scp client output - CVE-2016-10012: updated to fix server-side protocol errors observed during rekeying with compression enabled
Updated packages:
  • openssh-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:e35b66600c1036237fce5c30ab8de1a05f9b3cf6
  • openssh-askpass-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:a980b3e0c4c356e09321b8c25f48ed7fca158dac
  • openssh-clients-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:6228e00bf521c72d08910e9336d9753b2429a29f
  • openssh-ldap-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:621523c6f70b0a4cf7f50711c71e7c48192ed0bc
  • openssh-server-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:7e0fce5a4fd33f4f489a1c8a6b23bb9ff871a84c
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els4.i686.rpm
    sha:2b702883cee3b8bb6852c07c2b8fd2aa0cba8a36
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els4.x86_64.rpm
    sha:e024be739ac0b6e2fa93d882157f463aa1a6b50b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.