Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP5:GA
patchinfo.1821
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.1821
<patchinfo incident="1821"> <issue id="945493" tracker="bnc">Can't connect to lich.qam.suse.de after the update</issue> <issue id="945484" tracker="bnc">openssh deamon fails to restart after update</issue> <issue id="947458" tracker="bnc">L3-Question: sftp chroot failure after update to SLES 11 SP4</issue> <issue id="729190" tracker="bnc">prng patch in openssh does not handle overflow in seeding</issue> <issue id="932483" tracker="bnc">VUL-1: openssh: The Logjam Attack / weakdh.org</issue> <issue id="948902" tracker="bnc">sftp failures after installation of openssh 6.2p2-0.21.1</issue> <issue id="960414" tracker="bnc">sftp upload fails at 36gb, using sftp from openSSH</issue> <issue id="961368" tracker="bnc">ssh+kerberos: GSSAPIKeyExchange does not work</issue> <issue id="962313" tracker="bnc">VUL-1: CVE-2016-1908: openssh: possible fallback from untrusted to trusted X11 forwarding</issue> <issue id="965576" tracker="bnc">openssh daemon does not start in FIPS mode</issue> <issue id="970632" tracker="bnc">VUL-0: CVE-2016-3115: openssh: Missing sanitisation of untrusted input allows anauthenticated user who is able to request X11 forw...</issue> <issue id="975865" tracker="bnc">VUL-0: CVE-2015-8325: openssh: ignore PAM environment vars when UseLogin=yes</issue> <issue id="CVE-2015-8325" tracker="cve" /> <issue id="CVE-2016-1908" tracker="cve" /> <issue id="CVE-2016-3115" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pcerny</packager> <description>This update for OpenSSH fixes three security issues. These security issues were fixed: - CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632) - CVE-2016-1908: Prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313) - CVE-2015-8325: Ignore PAM environment when using login (bsc#975865) These non-security issues were fixed: - Fix help output of sftp (bsc#945493) - Restarting openssh with openssh-fips installed was not working correctly (bsc#945484) - Fix crashes when /proc is not available in the chroot (bsc#947458) - Correctly parse GSSAPI KEX algorithms (bsc#961368) - More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414) - Fix PRNG re-seeding (bsc#960414, bsc#729190) - Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902) </description> <summary>Security update for openssh</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor