Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-0741

Опубликовано: 12 мая 2016
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2016-0741: openssh security, bug fix, and enhancement update (MODERATE)

[5.3p1-117]

  • CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317817)

[5.3p1-116]

  • Restore functionallity of pam_ssh_agent_auth in FIPS mode (#1278315)
  • Initialize devices_done variable for challenge response (#1281468)
  • Update behaviour of X11 forwarding to match upstream (#1299048)

[5.3p1-115]

  • Ammends previous release, fixing typos and behaviour changes

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

openssh

5.3p1-117.el6

openssh-askpass

5.3p1-117.el6

openssh-clients

5.3p1-117.el6

openssh-ldap

5.3p1-117.el6

openssh-server

5.3p1-117.el6

pam_ssh_agent_auth

0.9.3-117.el6

Oracle Linux i686

openssh

5.3p1-117.el6

openssh-askpass

5.3p1-117.el6

openssh-clients

5.3p1-117.el6

openssh-ldap

5.3p1-117.el6

openssh-server

5.3p1-117.el6

pam_ssh_agent_auth

0.9.3-117.el6

Oracle Linux sparc64

openssh

5.3p1-117.el6

openssh-askpass

5.3p1-117.el6

openssh-clients

5.3p1-117.el6

openssh-ldap

5.3p1-117.el6

openssh-server

5.3p1-117.el6

pam_ssh_agent_auth

0.9.3-117.el6

Связанные уязвимости

suse-cvrf
почти 10 лет назад

Security update for openssh

suse-cvrf
почти 10 лет назад

Security update for openssh

suse-cvrf
почти 10 лет назад

Security update for openssh

CVSS3: 9.8
ubuntu
больше 8 лет назад

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.

redhat
больше 9 лет назад

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.