File _patchinfo of Package patchinfo.7566
<patchinfo incident="7566"> <issue id="1068310" tracker="bnc">[FIPS] openssh: integrity check not performed</issue> <issue id="1069509" tracker="bnc">OpenSSH - accidental re-introduction of CVE-2008-1483</issue> <issue id="1048367" tracker="bnc">sshd.service fails to signal startup failure</issue> <issue id="1006166" tracker="bnc">[Build2180] FIPS: openssh client is printing error message about unsupported KEX curve25519</issue> <issue id="1065000" tracker="bnc">VUL-1: CVE-2017-15906: openssh: r/o sftp-server zero byte file creation</issue> <issue id="2008-1483" tracker="cve" /> <issue id="2017-15906" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pcerny</packager> <description>This update for openssh fixes the following issues: Security issue fixed: - CVE-2017-15906: Stricter checking of operations in read-only mode in sftp server (bsc#1065000). Bug fixes: - FIPS: Startup selfchecks (bsc#1068310). - FIPS: Silent complaints about unsupported key exchange methods (bsc#1006166). - Refine handling of sockets for X11 forwarding to remove reintroduced CVE-2008-1483 (bsc#1069509). - Test configuration before running daemon to prevent looping resulting in service shutdown (bsc#1048367) This update was imported from the SUSE:SLE-12-SP2:Update update project.</description> <summary>Security update for openssh</summary> </patchinfo>