Description:
- CVE-2019-6109: verify character encoding in progress display to avoid
spoofing of scp client output
- CVE-2016-10012: updated to fix server-side protocol errors observed
during rekeying with compression enabled
Updated packages:
-
openssh-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
sha:6ae858aa36c81bfbdd254f1393cdbe0e8b47ca98
-
openssh-askpass-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
sha:fee10975f0d5ae53fbb83e39076c87f0a3c204af
-
openssh-clients-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
sha:f107df3439d31baf5a8c6914098b4016a442c73a
-
openssh-ldap-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
sha:bcbfc95014f66b4e383ffa5390415445fa28c89c
-
openssh-server-5.3p1-125.el6.tuxcare.els4.x86_64.rpm
sha:c7b74278c539c19a3dd0e212f524ec5eee013fe6
-
pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els4.i686.rpm
sha:0abde281eb5f29ef3e350a4ca2dddb3d5229611b
-
pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els4.x86_64.rpm
sha:353ca2df88d5e2588e489a013d5217f893352a4f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.