Description:
- CVE-2016-10708: fix crash in packet handling code by moving inbound NEWKEYS
handling to kex layer
- CVE-2016-10012: abandon the fix due to compression mode issues
Updated packages:
-
openssh-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
sha:794e0e71d02c541fb5bba456db736dd6ba436079
-
openssh-server-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
sha:6d2a30cd89e1ea98016c750b21ea22075f32d398
-
pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els2.i686.rpm
sha:8ef80009d0b97df6a4be4019d9e29c50a1e3f1ce
-
openssh-askpass-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
sha:b232c2c760a8b9e4f46e4a025a74b3066e99a93b
-
pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els2.x86_64.rpm
sha:698ecef5a7ca1885605b9752804d6af150358e1a
-
openssh-ldap-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
sha:3671fecce63dccb5a7458ac200bacd1e0a560c69
-
openssh-clients-5.3p1-125.el6.tuxcare.els2.x86_64.rpm
sha:edb47ca81fa111cd98d6559df1fa17c3237046c7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.