ELSA-2008-0855

ELSA-2008-0855 - openssh security update

Type:SECURITY
Severity:CRITICAL
Release Date:2008-08-22

Description



[4.3p2-26.el5_2.1]
- CVE-2007-4752 - Prevent ssh(1) from using a trusted X11 cookie if creation of an
untrusted cookie fails (#280361)


Related CVEs


CVE-2007-4752
CVE-2008-3844

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 4 (i386) openssh-3.9p1-10.RHEL4.20.src.rpm145a05e1366ed8313ce5fba78006175bELEA-2010-0511
openssh-3.9p1-11.el4_7.src.rpm3b7d0217cf5838774b18346982752fddELEA-2010-0511
openssh-3.9p1-10.RHEL4.20.i386.rpmfc71ea9f7bee1c10ff8e6d03d8bb4528ELEA-2010-0511
openssh-3.9p1-11.el4_7.i386.rpm021351b0b3e36503b4cb917167c397a2ELEA-2010-0511
openssh-askpass-3.9p1-10.RHEL4.20.i386.rpm0e1a8fd41069cfc01786b6c63204f670ELEA-2010-0511
openssh-askpass-3.9p1-11.el4_7.i386.rpmfc867b63411358a7fa84ca9f2a9199b4ELEA-2010-0511
openssh-askpass-gnome-3.9p1-10.RHEL4.20.i386.rpmb2716f6c0539cf02a0d66b2c75fac814ELEA-2010-0511
openssh-askpass-gnome-3.9p1-11.el4_7.i386.rpmbd1449f523f292f77a61aea3ebbbb319ELEA-2010-0511
openssh-clients-3.9p1-10.RHEL4.20.i386.rpm7ac47378f4ac81f191bbd6a89bf51410ELEA-2010-0511
openssh-clients-3.9p1-11.el4_7.i386.rpmb20e5c9420df62d77a58874602d1eba3ELEA-2010-0511
openssh-server-3.9p1-10.RHEL4.20.i386.rpmf44ada63779c775754d67527166ad332ELEA-2010-0511
openssh-server-3.9p1-11.el4_7.i386.rpmac5fd44f5982644a87ec4aee2539e368ELEA-2010-0511
Oracle Linux 4 (ia64) openssh-3.9p1-11.el4_7.src.rpm3b7d0217cf5838774b18346982752fddELEA-2010-0511
openssh-3.9p1-11.el4_7.ia64.rpmc7331e26dc9e3e0324e6bb26d9c72dbfELEA-2010-0511
openssh-askpass-3.9p1-11.el4_7.ia64.rpm9138d9ac541aa71d6a600a69ff63dacdELEA-2010-0511
openssh-askpass-gnome-3.9p1-11.el4_7.ia64.rpm0e86214e908e8f7382b8fa31b5564396ELEA-2010-0511
openssh-clients-3.9p1-11.el4_7.ia64.rpm8c83e105321326e6c4bb49bfb9aa8f93ELEA-2010-0511
openssh-server-3.9p1-11.el4_7.ia64.rpmf4cdbf96d84c8b2249de53d61d28ad0cELEA-2010-0511
Oracle Linux 4 (x86_64) openssh-3.9p1-10.RHEL4.20.src.rpm145a05e1366ed8313ce5fba78006175bELEA-2010-0511
openssh-3.9p1-11.el4_7.src.rpm3b7d0217cf5838774b18346982752fddELEA-2010-0511
openssh-3.9p1-10.RHEL4.20.x86_64.rpm093363878fe7d1833af7f2d793bc0489ELEA-2010-0511
openssh-3.9p1-11.el4_7.x86_64.rpm73144a2c26929a8f3a25f0bb0c72cc00ELEA-2010-0511
openssh-askpass-3.9p1-10.RHEL4.20.x86_64.rpm8b63a5871f4f024d8f138747b73e482dELEA-2010-0511
openssh-askpass-3.9p1-11.el4_7.x86_64.rpmc2375813078343e37276a04fc1a04d66ELEA-2010-0511
openssh-askpass-gnome-3.9p1-10.RHEL4.20.x86_64.rpm6e3f66a7e00fe6ce6907cc6e27511e6bELEA-2010-0511
openssh-askpass-gnome-3.9p1-11.el4_7.x86_64.rpm7ec179ef1c7ea66b74377a70af7d2cabELEA-2010-0511
openssh-clients-3.9p1-10.RHEL4.20.x86_64.rpm15fb22b1cac51783bb4ca34347054f82ELEA-2010-0511
openssh-clients-3.9p1-11.el4_7.x86_64.rpm08b5a7d7b0952879be170a6bcf00d43dELEA-2010-0511
openssh-server-3.9p1-10.RHEL4.20.x86_64.rpm19d6a5e1e4a15e5fd3f363f266bfc775ELEA-2010-0511
openssh-server-3.9p1-11.el4_7.x86_64.rpmbc48000c332d53d32f17a41694c4f7ddELEA-2010-0511
Oracle Linux 5 (i386) openssh-4.3p2-26.el5_2.1.src.rpm886c344dd5c7878211d8264e7ec9d507ELSA-2016-3531
openssh-4.3p2-26.el5_2.1.i386.rpm5f429c2c599c784e651c650cdc837584ELSA-2016-3531
openssh-askpass-4.3p2-26.el5_2.1.i386.rpm46520a927a6813915fe9ed3a14e4efe4ELSA-2016-3531
openssh-clients-4.3p2-26.el5_2.1.i386.rpm7f06dc1d21356c90887459e4f0da05baELSA-2016-3531
openssh-server-4.3p2-26.el5_2.1.i386.rpmc7c009f3391ebad1879da0586618b749ELSA-2016-3531
Oracle Linux 5 (x86_64) openssh-4.3p2-26.el5_2.1.src.rpm886c344dd5c7878211d8264e7ec9d507ELSA-2016-3531
openssh-4.3p2-26.el5_2.1.x86_64.rpm491531868619740f292346f4448d13a7ELSA-2016-3531
openssh-askpass-4.3p2-26.el5_2.1.x86_64.rpm1fcdc5349e0d0bbd7d4a3b0fe305f806ELSA-2016-3531
openssh-clients-4.3p2-26.el5_2.1.x86_64.rpm0b4ec5014c8f15619216f036d9cbaca8ELSA-2016-3531
openssh-server-4.3p2-26.el5_2.1.x86_64.rpmb22b3f191065319b3ae682860b957099ELSA-2016-3531



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete