SCIENTIFIC-LINUX-ERRATA Archives

January 2016

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Thu, 14 Jan 2016 21:32:39 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (38 lines)
Synopsis:          Moderate: openssh security update
Advisory ID:       SLSA-2016:0043-1
Issue Date:        2016-01-14
CVE Numbers:       CVE-2016-0777
                   CVE-2016-0778
--

An information leak flaw was found in the way the OpenSSH client roaming
feature was implemented. A malicious server could potentially use this
flaw to leak portions of memory (possibly including private SSH keys) of a
successfully authenticated OpenSSH client. (CVE-2016-0777)

A buffer overflow flaw was found in the way the OpenSSH client roaming
feature was implemented. A malicious server could potentially use this
flaw to execute arbitrary code on a successfully authenticated OpenSSH
client if that client used certain non-default configuration options.
(CVE-2016-0778)

After installing this update, the OpenSSH server daemon (sshd) will be
restarted automatically.
--

SL7
  x86_64
    openssh-6.6.1p1-23.el7_2.x86_64.rpm
    openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm
    openssh-clients-6.6.1p1-23.el7_2.x86_64.rpm
    openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm
    openssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm
    openssh-server-6.6.1p1-23.el7_2.x86_64.rpm
    openssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm
    openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm
    openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm
    pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm
    pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2