OVMSA-2017-0053

OVMSA-2017-0053 - openssh security update

Type:SECURITY
Severity:MODERATE
Release Date:2017-03-29

Description


[5.3p1-122]
- Allow to use ibmca crypto hardware (#1397547)
- CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (1405374)

[5.3p1-121]
- Fix missing hmac-md5-96 from server offer (#1373836)

[5.3p1-120]
- Prevent infinite loop when Ctrl+Z pressed at password prompt (#1218424)
- Remove RC4 cipher and MD5 based MAC from the default client proposal (#1373836)

[5.3p1-119]
- Resolve sftp force permission colision with umask (#1341747)
- Relax bits needed check to allow hmac-sha2-512 with gss-group1-sha1- (#1353359)
- close ControlPersist background process stderr when not in debug mode (#1335539)
- Do not add a message 'The agent has no identities.' in ~/.ssh/authorized_keys (#1353410)

[5.3p1-118]
- ssh-copy-id: SunOS does not understand ~ (#1327547)


Related CVEs


CVE-2015-8325

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.3 (x86_64) openssh-5.3p1-122.el6.src.rpmf24e0df587be6d4fb091865f3e79fe62OVMSA-2019-0013
openssh-5.3p1-122.el6.x86_64.rpmc5bcadb6e1c0f008c3664ba3da36613dOVMSA-2019-0013
openssh-clients-5.3p1-122.el6.x86_64.rpm3d8311bb629416e468210c70fb0d0e3cOVMSA-2019-0013
openssh-server-5.3p1-122.el6.x86_64.rpm45253b1a75b4320144707fb4f917eaf9OVMSA-2019-0013
Oracle VM 3.4 (x86_64) openssh-5.3p1-122.el6.src.rpmf24e0df587be6d4fb091865f3e79fe62OVMSA-2019-0013
openssh-5.3p1-122.el6.x86_64.rpmc5bcadb6e1c0f008c3664ba3da36613dOVMSA-2019-0013
openssh-clients-5.3p1-122.el6.x86_64.rpm3d8311bb629416e468210c70fb0d0e3cOVMSA-2019-0013
openssh-server-5.3p1-122.el6.x86_64.rpm45253b1a75b4320144707fb4f917eaf9OVMSA-2019-0013



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete