Download
| Alert*
oval:org.secpod.oval:def:506497
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix: * openssh: Observable discrepancy leading to an information leak in the algorithm negotiation For ... oval:org.secpod.oval:def:89002804 This update for openssh fixes the following issues: - CVE-2020-14145: Fixed a potential information leak during host key exchange . oval:org.secpod.oval:def:89050351 This update for openssh fixes the following issues: - CVE-2020-14145: Fixed a potential information leak during host key exchange . oval:org.secpod.oval:def:89050306 This update for openssh fixes the following issues: - CVE-2020-14145: Fixed a potential information leak during host key exchange . - Supplement libgtk-3-0 instead of libX11-6 to avoid installation on a textmode install - Fixed an issue where oracle cluster with cluvfy using "scp" failing/missinter ... oval:org.secpod.oval:def:4501341 OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix: * openssh: Observable discrepancy leading to an information leak in the algorithm negotiation For ... oval:org.secpod.oval:def:69255 A flaw was found in OpenSSH in versions 5.7 through 8.3, where an Observable Discrepancy occurs and leads to an information leak in the algorithm negotiation. This flaw allows a man-in-the-middle attacker to target initial connection attempts, where there is no host key for the server that has been ... oval:org.secpod.oval:def:2500336 OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. oval:org.secpod.oval:def:69259 The host is installed with OpenSSH 5.7 through 8.4 and is prone to an information disclosure vulnerability. A flaw is present in application, which fails to handle algorithm negotiation. Successful exploitation could allows man-in-the-middle attackers to target initial connection attempts. oval:org.secpod.oval:def:69257 The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client. oval:org.secpod.oval:def:89000068 This update for openssh fixes the following issues: - CVE-2020-14145: Fixed an observable discrepancy leading to an information leak in the algorithm negotiation . - Fixed an issue where AuthorizedKeysCommand produced a lot of output . - Fixed an issue where oracle cluster with cluvfy using quot;scp ... oval:org.secpod.oval:def:89000306 This update for openssh fixes the following issues: - CVE-2020-14145: Fixed a potential information leak during host key exchange . - Fixed an issue where oracle cluster with cluvfy using quot;scpquot; failing/missinterpreted . oval:org.secpod.oval:def:69260 The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). oval:org.secpod.oval:def:1505249 [8.0p1-10] - sshd -T requires -C when "Match" is used in sshd_config [8.0p1-9] - CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation - Hostbased ssh authentication fails if session ID contains a "/" [8.0p1-8] - ssh doesnt restore the blocking ... |