OVMSA-2016-0030

OVMSA-2016-0030 - openssh security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-02-24

Description


[4.3p2-82.0.1]
- change default value of MaxStartups - CVE-2010-5107 (John Haxby) [orabug 22766491]

[4.3p2-82]
- improve RNG seeding from /dev/random (#681291,#708056)

[4.3p2-81]
- make ssh(1)'s ConnectTimeout option apply to both the TCP connection and
SSH banner exchange (#750725)

[4.3p2-80]
- use IPV6_V6ONLY for sshd inet6 listening socket (#640857)

[4.3p2-79]
- add LANGUAGE to the sent/accepted evvironment (#710229)
- ssh-copy-id copies now id_rsa.pub by default (#731930)
- repairs man pages (#731925)

[4.3p2-78]
- set cloexec on accept socket (#642935)
- add umask to sftp (#720598)
- enable lastolg for big uids (#706315)

[4.3p2-77]
- enable selinux domain transition to passwd_t (#689406)

[4.3p2-76]
- enable pubkey auth in the fips mode (#674747)

[4.3p2-75]
- improve resseding the prng from /dev/urandom or /dev/random respectively (#681291)

[4.3p2-73]
- periodically ressed the prng from /dev/urandom or /dev/random respectively (#681291)

[4.3p2-72]
- change cipher preferences (#661716)

[4.3p2-71]
- change cipher preferences (#661716)
- enable to run sshd as non root user (#661669)

[4.3p2-70]
- reenable rekeying (#659242)

[4.3p2-69]
- add nss keys to key audit patch (#632402)

[4.3p2-68]
- key audit patch (#632402)

[4.3p2-47]
- supply forced command documentation (#532559)

[4.3p2-46]
- compile in the OpenSSL engine support

[4.3p2-45]
- record lastlog with big uid (#616396)

[4.3p2-44]
- add OpenSSL engine support (#594815)

[4.3p2-43]
- backport forced command directive (#532559)

[4.3p2-42]
- stderr does not more disturb sftp (#576765)


Related CVEs


CVE-2010-5107

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 2.2 (i386) openssh-4.3p2-82.0.1.el5.src.rpm420b3dee9f13648152f7a001c50575fe8e28936db61647c48314cf8d9b3a57e7OVMSA-2023-0019ovm22_i386_latest
openssh-4.3p2-82.0.1.el5.i386.rpm6fbf10b97f569b625c4cbc3302f9e1bca6e68000ae2184846d85b47a02e421ceOVMSA-2023-0019ovm22_i386_latest
openssh-clients-4.3p2-82.0.1.el5.i386.rpm8f341bde121d69cf72dbec40de8c62de869e3a24130828822c199dd83ce36f70OVMSA-2023-0019ovm22_i386_latest
openssh-server-4.3p2-82.0.1.el5.i386.rpm2f2306b16dcefc62ff423f0662846ea93ed3d82ec2034efb2af2719a26ba8196OVMSA-2023-0019ovm22_i386_latest
Oracle VM 3.2 (x86_64) openssh-4.3p2-82.0.1.el5.src.rpm420b3dee9f13648152f7a001c50575fe8e28936db61647c48314cf8d9b3a57e7OVMSA-2023-0019ovm3_3.2.1_x86_64_patch
openssh-4.3p2-82.0.1.el5.x86_64.rpm0e501ef9875742bb4b73a993db2f257cc67c878891c5f8595185aa1889692013OVMSA-2023-0019ovm3_3.2.1_x86_64_patch
openssh-clients-4.3p2-82.0.1.el5.x86_64.rpm65d3c34b94ccafadcf7d470d379da1b9e6cd54d9268782136102b900267d27b7OVMSA-2023-0019ovm3_3.2.1_x86_64_patch
openssh-server-4.3p2-82.0.1.el5.x86_64.rpm4b1563e11bfe69b164d99c0620a0a2bba1cb7deb30ff8b295b5d9b042a6113f3OVMSA-2023-0019ovm3_3.2.1_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete