[CLSA-2022:1658171690] Fixed CVE-2016-10012 in openssh
Type:
security
Severity:
Important
Release date:
2022-07-18
Description:
- CVE-2016-10012: re-remove pre-authentication compression and potentially unsecure shared memory manager used by zlib - Move not yet valid timestamps for certs to 2030-2040 range, make sure all tests are passed and add %check unset DISPLAY section
Updated packages:
  • openssh-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:789d6b0ee486af92069073b0232ec6941d4fd31e
  • openssh-clients-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:3f16484a0fc30d48173c0715d0c65b21ff09cb5e
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els3.i686.rpm
    sha:51457b235b8eedcb4409bd5f44cc13832027f035
  • openssh-server-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:0b570355ccf5456028649877d31b346591b34724
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els3.x86_64.rpm
    sha:82bc94886988b5df3408f16c6abd3b67106d2cca
  • openssh-askpass-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:caa3dda9b11a11325aa2ca6d6ab2fffc280e74f6
  • openssh-ldap-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:f9c03328a1977bcb64eec9323051d0d91cda6dc5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.