Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-4368

Опубликовано: 16 нояб. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-4368: openssh security update (MODERATE)

[8.0p1-10]

  • sshd -T requires -C when 'Match' is used in sshd_config (#1836277)

[8.0p1-9]

  • CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation (#1882252)
  • Hostbased ssh authentication fails if session ID contains a '/' (#1944125)

[8.0p1-8]

  • ssh doesnt restore the blocking mode on standard output (#1942901)

[8.0p1-7 + 0.10.3-7]

  • SFTP sort upon the modification time (#1909988)
  • ssh-keygen printing fingerprint issue with Windows keys (#1901518)
  • PIN is lost when iterating over tokens when adding pkcs11 keys to ssh-agent (#1843372)
  • ssh-agent segfaults during ssh-add -s pkcs11 (#1868996)
  • ssh-copy-id could not resolve ipv6 address ends with colon (#1933517)
  • sshd provides PAM an incorrect error code (#1879503)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

openssh

8.0p1-10.el8

openssh-askpass

8.0p1-10.el8

openssh-cavs

8.0p1-10.el8

openssh-clients

8.0p1-10.el8

openssh-keycat

8.0p1-10.el8

openssh-ldap

8.0p1-10.el8

openssh-server

8.0p1-10.el8

pam_ssh_agent_auth

0.10.3-7.10.el8

Oracle Linux x86_64

openssh

8.0p1-10.el8

openssh-askpass

8.0p1-10.el8

openssh-cavs

8.0p1-10.el8

openssh-clients

8.0p1-10.el8

openssh-keycat

8.0p1-10.el8

openssh-ldap

8.0p1-10.el8

openssh-server

8.0p1-10.el8

pam_ssh_agent_auth

0.10.3-7.10.el8

Связанные CVE

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
redhat
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
nvd
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 5.9
debian
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepan ...