Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:13.2:Update
patchinfo.4527
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4527
<patchinfo incident="4527"> <issue id="961645" tracker="bnc">VUL-0: CVE-2016-0778: openssh: Buffer overflow in roaming code</issue> <issue id="961642" tracker="bnc">VUL-0: CVE-2016-0777: openssh: Information leak in ssh client</issue> <issue id="CVE-2016-0777" tracker="cve" /> <issue id="CVE-2016-0778" tracker="cve" /> <category>security</category> <rating>critical</rating> <packager>AndreasStieger</packager> <description> This update for openssh fixes the following issues: - CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642) - CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645) This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server. </description> <summary>Security update for openssh</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor