Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-0741

Опубликовано: 12 мая 2016
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2016-0741: openssh security, bug fix, and enhancement update (MODERATE)

[5.3p1-117]

  • CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317817)

[5.3p1-116]

  • Restore functionallity of pam_ssh_agent_auth in FIPS mode (#1278315)
  • Initialize devices_done variable for challenge response (#1281468)
  • Update behaviour of X11 forwarding to match upstream (#1299048)

[5.3p1-115]

  • Ammends previous release, fixing typos and behaviour changes

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

openssh

5.3p1-117.el6

openssh-askpass

5.3p1-117.el6

openssh-clients

5.3p1-117.el6

openssh-ldap

5.3p1-117.el6

openssh-server

5.3p1-117.el6

pam_ssh_agent_auth

0.9.3-117.el6

Oracle Linux i686

openssh

5.3p1-117.el6

openssh-askpass

5.3p1-117.el6

openssh-clients

5.3p1-117.el6

openssh-ldap

5.3p1-117.el6

openssh-server

5.3p1-117.el6

pam_ssh_agent_auth

0.9.3-117.el6

Oracle Linux sparc64

openssh

5.3p1-117.el6

openssh-askpass

5.3p1-117.el6

openssh-clients

5.3p1-117.el6

openssh-ldap

5.3p1-117.el6

openssh-server

5.3p1-117.el6

pam_ssh_agent_auth

0.9.3-117.el6

Связанные уязвимости

suse-cvrf
около 10 лет назад

Security update for openssh

suse-cvrf
около 10 лет назад

Security update for openssh

suse-cvrf
около 10 лет назад

Security update for openssh

CVSS3: 9.8
ubuntu
больше 8 лет назад

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.

redhat
почти 10 лет назад

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.