Synopsis: Moderate: openssh security update Advisory ID: SLSA-2017:2563-1 Issue Date: 2017-08-31 CVE Numbers: CVE-2016-6210 -- Security Fix(es): * A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users. A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses. (CVE-2016-6210) -- SL6 x86_64 openssh-5.3p1-123.el6_9.x86_64.rpm openssh-askpass-5.3p1-123.el6_9.x86_64.rpm openssh-clients-5.3p1-123.el6_9.x86_64.rpm openssh-debuginfo-5.3p1-123.el6_9.x86_64.rpm openssh-server-5.3p1-123.el6_9.x86_64.rpm openssh-debuginfo-5.3p1-123.el6_9.i686.rpm openssh-ldap-5.3p1-123.el6_9.x86_64.rpm pam_ssh_agent_auth-0.9.3-123.el6_9.i686.rpm pam_ssh_agent_auth-0.9.3-123.el6_9.x86_64.rpm i386 openssh-5.3p1-123.el6_9.i686.rpm openssh-askpass-5.3p1-123.el6_9.i686.rpm openssh-clients-5.3p1-123.el6_9.i686.rpm openssh-debuginfo-5.3p1-123.el6_9.i686.rpm openssh-server-5.3p1-123.el6_9.i686.rpm openssh-ldap-5.3p1-123.el6_9.i686.rpm pam_ssh_agent_auth-0.9.3-123.el6_9.i686.rpm - Scientific Linux Development Team