Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2017-03-29 |
[5.3p1-122]
- Allow to use ibmca crypto hardware (#1397547)
- CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (1405374)
[5.3p1-121]
- Fix missing hmac-md5-96 from server offer (#1373836)
[5.3p1-120]
- Prevent infinite loop when Ctrl+Z pressed at password prompt (#1218424)
- Remove RC4 cipher and MD5 based MAC from the default client proposal (#1373836)
[5.3p1-119]
- Resolve sftp force permission colision with umask (#1341747)
- Relax bits needed check to allow hmac-sha2-512 with gss-group1-sha1- (#1353359)
- close ControlPersist background process stderr when not in debug mode (#1335539)
- Do not add a message 'The agent has no identities.' in ~/.ssh/authorized_keys (#1353410)
[5.3p1-118]
- ssh-copy-id: SunOS does not understand ~ (#1327547)
CVE-2015-8325 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle VM 3.3 (x86_64) | openssh-5.3p1-122.el6.src.rpm | f24e0df587be6d4fb091865f3e79fe62 | OVMSA-2019-0013 |
openssh-5.3p1-122.el6.x86_64.rpm | c5bcadb6e1c0f008c3664ba3da36613d | OVMSA-2019-0013 | |
openssh-clients-5.3p1-122.el6.x86_64.rpm | 3d8311bb629416e468210c70fb0d0e3c | OVMSA-2019-0013 | |
openssh-server-5.3p1-122.el6.x86_64.rpm | 45253b1a75b4320144707fb4f917eaf9 | OVMSA-2019-0013 | |
Oracle VM 3.4 (x86_64) | openssh-5.3p1-122.el6.src.rpm | f24e0df587be6d4fb091865f3e79fe62 | OVMSA-2019-0013 |
openssh-5.3p1-122.el6.x86_64.rpm | c5bcadb6e1c0f008c3664ba3da36613d | OVMSA-2019-0013 | |
openssh-clients-5.3p1-122.el6.x86_64.rpm | 3d8311bb629416e468210c70fb0d0e3c | OVMSA-2019-0013 | |
openssh-server-5.3p1-122.el6.x86_64.rpm | 45253b1a75b4320144707fb4f917eaf9 | OVMSA-2019-0013 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team