aboutsummaryrefslogtreecommitdiffstats
path: root/testing/ruby-daemon-controller
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2016-01-14 22:02:37 +0100
committerNatanael Copa <ncopa@alpinelinux.org>2016-01-14 21:09:08 +0000
commite59f53fd6f9b4e3da0f5f224a73054a00903dc16 (patch)
treef49b5a626848d406f66f3697b5e588843162c7e2 /testing/ruby-daemon-controller
parent47c1abfe2e1e3dd962e941287786c47271eb0aa2 (diff)
downloadaports-e59f53fd6f9b4e3da0f5f224a73054a00903dc16.tar.bz2
aports-e59f53fd6f9b4e3da0f5f224a73054a00903dc16.tar.xz
main/openssh: security fix for CVE-2016-0777 and CVE-2016-0778
CVE-2016-0777 An information leak (memory disclosure) can be exploited by a rogue SSH server to trick a client into leaking sensitive data from the client memory, including for example private keys. CVE-2016-0778 A buffer overflow (leading to file descriptor leak), can also be exploited by a rogue SSH server, but due to another bug in the code is possibly not exploitable, and only under certain conditions (not the default configuration), when using ProxyCommand, ForwardAgent or ForwardX11. fixes #5017
Diffstat (limited to 'testing/ruby-daemon-controller')
0 files changed, 0 insertions, 0 deletions