Synopsis: Moderate: openssh security update
Advisory ID: SLSA-2016:0043-1
Issue Date: 2016-01-14
CVE Numbers: CVE-2016-0777
CVE-2016-0778
—
An information leak flaw was found in the way the OpenSSH client roaming
feature was implemented. A malicious server could potentially use this
flaw to leak portions of memory (possibly including private SSH keys) of a
successfully authenticated OpenSSH client. (CVE-2016-0777)
A buffer overflow flaw was found in the way the OpenSSH client roaming
feature was implemented. A malicious server could potentially use this
flaw to execute arbitrary code on a successfully authenticated OpenSSH
client if that client used certain non-default configuration options.
(CVE-2016-0778)
After installing this update, the OpenSSH server daemon (sshd) will be
restarted automatically.
—
SL7
x86_64
openssh-6.6.1p1-23.el7_2.x86_64.rpm
openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm
openssh-clients-6.6.1p1-23.el7_2.x86_64.rpm
openssh-debuginfo-6.6.1p1-23.el7_2.x86_64.rpm
openssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm
openssh-server-6.6.1p1-23.el7_2.x86_64.rpm
openssh-debuginfo-6.6.1p1-23.el7_2.i686.rpm
openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm
openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm
pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm
pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm
– Scientific Linux Development Team