Lucene search

K
oraclelinuxOracleLinuxELSA-2019-3702
HistoryNov 14, 2019 - 12:00 a.m.

openssh security, bug fix, and enhancement update

2019-11-1400:00:00
linux.oracle.com
29

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

[8.0p1-3 + 0.10.3-7]

  • Fix typos in manual pages (#1668325)
  • Use the upstream support for PKCS#8 PEM files alongside with the legacy PEM files (#1712436)
  • Unbreak ssh-keygen -A in FIPS mode (#1732424)
  • Add missing RSA certificate types to offered hostkey types in FIPS mode (#1732449)
    [8.0p1-2 + 0.10.3-7]
  • Allow specifying a pin-value in PKCS #11 URI in ssh-add (#1639698)
  • Whitelist another syscall variant for s390x cryptographic module (ibmca engine) (#1714915)
    [8.0p1-1 + 0.10.3-7]
  • New upstream release (#1691045)
  • Remove support for unused VendorPatchLevel configuration option
  • Fix kerberos cleanup procedures (#1683295)
  • Do not negotiate arbitrary primes with DH GEX in FIPS (#1685096)
  • Several GSSAPI key exchange improvements and sync with Debian
  • Allow to use labels in PKCS#11 URIs even if they do not match on private key (#1671262)
  • Do not fall back to sshd_net_t SELinux context (#1678695)
  • Use FIPS compliant high-level signature OpenSSL API and KDF
  • Mention crypto-policies in manual pages
  • Do not fail if non-FIPS approved algorithm is enabled in FIPS
  • Generate the PEM files in new PKCS#8 format without the need of MD5 (#1712436)

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P