[CLSA-2022:1658171011] Fixed CVE-2016-10012 in openssh
Type:
security
Severity:
Important
Release date:
2022-07-18
Description:
- CVE-2016-10012: re-remove pre-authentication compression and potentially unsecure shared memory manager used by zlib - Move not yet valid timestamps for certs to 2030-2040 range, make sure all tests are passed and add %check unset DISPLAY section
Updated packages:
  • openssh-ldap-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:51ede232e1d05b041514632159c982c3cb5060f8
  • openssh-server-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:063f208a6c64ce2123c0f4c33f4088adc00cc000
  • openssh-askpass-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:319056478ebe77049457a46976cad6be1799e432
  • openssh-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:184b3b9e99acf6b3ccb89c923231601398bd565f
  • openssh-clients-5.3p1-125.el6.tuxcare.els3.x86_64.rpm
    sha:79d6f892ddb1ef952c353ad7e6879e95d618efbc
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els3.i686.rpm
    sha:d0f19886cd4a918d11cb9fa6ffc60b6e25d6e240
  • pam_ssh_agent_auth-0.9.3-125.el6.tuxcare.els3.x86_64.rpm
    sha:3f27989ea61e6e9fd72210f3da92c8fa8504d9e7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.