[CLSA-2022:1671481111] openssh: Fix of 2 CVEs
Type:
security
Severity:
Moderate
Release date:
2022-12-19
Description:
- CVE-2019-6109: verify character encoding in progress display to avoid spoofing of scp client output - CVE-2016-10012: updated to fix server-side protocol errors observed during rekeying with compression enabled
Updated packages:
  • openssh-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:6ae858aa36c81bfbdd254f1393cdbe0e8b47ca98
  • openssh-askpass-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:fee10975f0d5ae53fbb83e39076c87f0a3c204af
  • openssh-clients-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:f107df3439d31baf5a8c6914098b4016a442c73a
  • openssh-ldap-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:bcbfc95014f66b4e383ffa5390415445fa28c89c
  • openssh-server-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
    sha:c7b74278c539c19a3dd0e212f524ec5eee013fe6
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els4.i686.rpm
    sha:0abde281eb5f29ef3e350a4ca2dddb3d5229611b
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els4.x86_64.rpm
    sha:353ca2df88d5e2588e489a013d5217f893352a4f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.