Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-2588

Опубликовано: 09 нояб. 2016
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2016-2588: openssh security, bug fix, and enhancement update (MODERATE)

[6.6.1p1-31 + 0.9.3-9]

  • Do not depend on selinux-policy (#1373297)

[6.6.1p1-30 + 0.9.3-9]

  • Drop dependency on libcap-ng for ssh-keycat (#1357859)

[6.6.1p1-29 + 0.9.3-9]

  • Rework SELinux context handling with chroot using libcap-ng (#1357859)

[6.6.1p1-28 + 0.9.3-9]

  • SFTP force permission collision with umask (#1344614)
  • Make closefrom() ignore FD's to /dev/ devices on s390 (#1318760)
  • Create a default value for AuthenticationMethods any (#1237129)
  • Fix ssh-copy-id with LogLevel=quiet (#1349556)
  • Expose more information to PAM (#1312304)
  • Move MAX_DISPLAYS to a configuration option (#1341302)
  • Add a wildcard option to PermitOpen directive (host) (#1344106)

[6.6.1p1-27 + 0.9.3-9]

  • Coverity and RPMDiff build issues (#1334326)
  • CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (#1329191)
  • Check for real location of .k5login file (#1328243)
  • close ControlPersist background process stderr (#1335540)

[6.6.1p1-26 + 0.9.3-9]

  • Drop glob patch for sftp client preventing listing many files (#1310303)
  • Fix race condition between audit messages from different processes (#1310684)
  • Make systemd service forking to properly report state (#1291172)
  • Get rid of rpm triggers for openssh-5.x (#1312013)
  • Generate the host keys when the key files are empty (#1266043)
  • pam_ssh_agent_auth: authorized_keys_command option (#1317858)
  • Don't use MD5 digest from pam_ssh_agent_auth in FIPS mode (#1317952)

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

openssh

6.6.1p1-31.el7

openssh-askpass

6.6.1p1-31.el7

openssh-clients

6.6.1p1-31.el7

openssh-keycat

6.6.1p1-31.el7

openssh-ldap

6.6.1p1-31.el7

openssh-server

6.6.1p1-31.el7

openssh-server-sysvinit

6.6.1p1-31.el7

pam_ssh_agent_auth

0.9.3-9.31.el7

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

CVSS3: 7
redhat
больше 9 лет назад

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

CVSS3: 7.8
nvd
больше 9 лет назад

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.

CVSS3: 7.8
debian
больше 9 лет назад

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p ...

CVSS3: 7.8
github
больше 3 лет назад

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.