[CLSA-2022:1657560108] Fixed CVEs in openssh: CVE-2016-10708, CVE-2016-10012
Type:
security
Severity:
Important
Release date:
2022-07-11
Description:
- CVE-2016-10708: fix crash in packet handling code by moving inbound NEWKEYS handling to kex layer - CVE-2016-10012: abandon the fix due to compression mode issues
Updated packages:
  • openssh-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
    sha:794e0e71d02c541fb5bba456db736dd6ba436079
  • openssh-server-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
    sha:6d2a30cd89e1ea98016c750b21ea22075f32d398
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els2.i686.rpm
    sha:8ef80009d0b97df6a4be4019d9e29c50a1e3f1ce
  • openssh-askpass-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
    sha:b232c2c760a8b9e4f46e4a025a74b3066e99a93b
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els2.x86_64.rpm
    sha:698ecef5a7ca1885605b9752804d6af150358e1a
  • openssh-ldap-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
    sha:3671fecce63dccb5a7458ac200bacd1e0a560c69
  • openssh-clients-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
    sha:edb47ca81fa111cd98d6559df1fa17c3237046c7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.