[ALSA-2022:2013] Moderate: openssh security, bug fix, and enhancement update
Type:
security
Severity:
moderate
Release date:
2022-05-10
Description:
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured (CVE-2021-41617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages:
  • openssh-askpass-8.0p1-13.el8.ppc64le.rpm
  • pam_ssh_agent_auth-0.10.3-7.13.el8.ppc64le.rpm
  • openssh-keycat-8.0p1-13.el8.ppc64le.rpm
  • openssh-ldap-8.0p1-13.el8.ppc64le.rpm
  • openssh-8.0p1-13.el8.ppc64le.rpm
  • openssh-clients-8.0p1-13.el8.ppc64le.rpm
  • openssh-cavs-8.0p1-13.el8.ppc64le.rpm
  • openssh-server-8.0p1-13.el8.ppc64le.rpm
  • pam_ssh_agent_auth-0.10.3-7.13.el8.aarch64.rpm
  • openssh-ldap-8.0p1-13.el8.aarch64.rpm
  • openssh-server-8.0p1-13.el8.aarch64.rpm
  • openssh-askpass-8.0p1-13.el8.aarch64.rpm
  • openssh-cavs-8.0p1-13.el8.aarch64.rpm
  • openssh-keycat-8.0p1-13.el8.aarch64.rpm
  • openssh-clients-8.0p1-13.el8.aarch64.rpm
  • openssh-8.0p1-13.el8.aarch64.rpm
  • openssh-ldap-8.0p1-13.el8.x86_64.rpm
  • openssh-keycat-8.0p1-13.el8.x86_64.rpm
  • openssh-cavs-8.0p1-13.el8.x86_64.rpm
  • openssh-8.0p1-13.el8.x86_64.rpm
  • openssh-askpass-8.0p1-13.el8.x86_64.rpm
  • openssh-server-8.0p1-13.el8.x86_64.rpm
  • openssh-clients-8.0p1-13.el8.x86_64.rpm
  • pam_ssh_agent_auth-0.10.3-7.13.el8.x86_64.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.