Описание
ELSA-2021-4368: openssh security update (MODERATE)
[8.0p1-10]
- sshd -T requires -C when 'Match' is used in sshd_config (#1836277)
[8.0p1-9]
- CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation (#1882252)
- Hostbased ssh authentication fails if session ID contains a '/' (#1944125)
[8.0p1-8]
- ssh doesnt restore the blocking mode on standard output (#1942901)
[8.0p1-7 + 0.10.3-7]
- SFTP sort upon the modification time (#1909988)
- ssh-keygen printing fingerprint issue with Windows keys (#1901518)
- PIN is lost when iterating over tokens when adding pkcs11 keys to ssh-agent (#1843372)
- ssh-agent segfaults during ssh-add -s pkcs11 (#1868996)
- ssh-copy-id could not resolve ipv6 address ends with colon (#1933517)
- sshd provides PAM an incorrect error code (#1879503)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
openssh
8.0p1-10.el8
openssh-askpass
8.0p1-10.el8
openssh-cavs
8.0p1-10.el8
openssh-clients
8.0p1-10.el8
openssh-keycat
8.0p1-10.el8
openssh-ldap
8.0p1-10.el8
openssh-server
8.0p1-10.el8
pam_ssh_agent_auth
0.10.3-7.10.el8
Oracle Linux x86_64
openssh
8.0p1-10.el8
openssh-askpass
8.0p1-10.el8
openssh-cavs
8.0p1-10.el8
openssh-clients
8.0p1-10.el8
openssh-keycat
8.0p1-10.el8
openssh-ldap
8.0p1-10.el8
openssh-server
8.0p1-10.el8
pam_ssh_agent_auth
0.10.3-7.10.el8
Связанные CVE
Связанные уязвимости
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepan ...