File _patchinfo of Package patchinfo.17375
<patchinfo incident="17375">
<issue tracker="bnc" id="1174162">kernel: sshd : segfault at 30000000b error 4 in libc-2.26.so - ref:_00D1igLOd._5001iPxqr9:ref</issue>
<issue tracker="bnc" id="1139398">VUL-1: openssh: speculative hardening for key storage</issue>
<issue tracker="bnc" id="1148566">L3-Question: oracle cluster issue with cluvfy using "scp" failing/missinterpreted after upgrading ref:_00D1igLOd._5001iKKNzK:ref</issue>
<issue tracker="bnc" id="1173513">VUL-0: CVE-2020-14145: openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempt</issue>
<issue tracker="bnc" id="1115550">SSHD termination of multichannel sessions with non-root users (error on 'mm_request_receive_expect')</issue>
<issue tracker="bnc" id="1142000">openssh-askpass-gnome bloats server installation</issue>
<issue tracker="cve" id="2020-14145"/>
<packager>hpjansson</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for openssh</summary>
<description>This update for openssh fixes the following issues:
- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).
- Supplement libgtk-3-0 instead of libX11-6 to avoid installation on a textmode install (bsc#1142000)
- Fixed an issue where oracle cluster with cluvfy using "scp" failing/missinterpreted (bsc#1148566).
- Fixed sshd termination of multichannel sessions with non-root users (bsc#1115550,bsc#1174162).
- Added speculative hardening for key storage (bsc#1139398).
</description>
</patchinfo>