OpenSSH Key Based Source IP Access Control Bypass Vulnerability

Solution:
Upgrades are available.


Redhat openssh-askpass-2.1.1p4-1.i386.rpm

Redhat openssh-clients-2.1.1p4-1.i386.rpm

Redhat openssh-server-2.1.1p4-1.i386.rpm

Redhat openssh-2.9p2-7.i386.rpm

Redhat openssh-askpass-gnome-2.9p2-7.i386.rpm

Redhat openssh-2.5.2p2-5.i386.rpm

Redhat openssh-askpass-2.9p2-7.i386.rpm

Redhat openssh-2.1.1p4-1.i386.rpm

Redhat openssh-askpass-gnome-2.1.1p4-1.i386.rpm

Redhat openssh-server-2.5.2p2-5.i386.rpm

Redhat openssh-askpass-gnome-2.5.2p2-5.i386.rpm

Redhat openssh-clients-2.9p2-7.i386.rpm

Redhat openssh-clients-2.5.2p2-5.i386.rpm

Redhat openssh-server-2.9p2-7.i386.rpm

Redhat openssh-askpass-2.5.2p2-5.i386.rpm

OpenSSH OpenSSH 2.5

OpenSSH OpenSSH 2.5.1

OpenSSH OpenSSH 2.5.2

OpenSSH OpenSSH 2.9

OpenSSH OpenSSH 2.9 p2


 

Privacy Statement
Copyright 2010, SecurityFocus