diff options
| author | Natanael Copa <ncopa@alpinelinux.org> | 2016-01-14 22:02:37 +0100 |
|---|---|---|
| committer | Natanael Copa <ncopa@alpinelinux.org> | 2016-01-14 21:09:08 +0000 |
| commit | e59f53fd6f9b4e3da0f5f224a73054a00903dc16 (patch) | |
| tree | f49b5a626848d406f66f3697b5e588843162c7e2 /testing/ruby-daemon-controller | |
| parent | 47c1abfe2e1e3dd962e941287786c47271eb0aa2 (diff) | |
| download | aports-e59f53fd6f9b4e3da0f5f224a73054a00903dc16.tar.bz2 aports-e59f53fd6f9b4e3da0f5f224a73054a00903dc16.tar.xz | |
main/openssh: security fix for CVE-2016-0777 and CVE-2016-0778
CVE-2016-0777
An information leak (memory disclosure) can be exploited by a rogue
SSH server to trick a client into leaking sensitive data from the
client memory, including for example private keys.
CVE-2016-0778
A buffer overflow (leading to file descriptor leak), can also be
exploited by a rogue SSH server, but due to another bug in the code
is possibly not exploitable, and only under certain conditions (not
the default configuration), when using ProxyCommand, ForwardAgent or
ForwardX11.
fixes #5017
Diffstat (limited to 'testing/ruby-daemon-controller')
0 files changed, 0 insertions, 0 deletions
