aboutsummaryrefslogtreecommitdiffstats
path: root/testing/ruby-github-markup/APKBUILD
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2016-01-14 22:02:37 +0100
committerNatanael Copa <ncopa@alpinelinux.org>2016-01-14 22:05:47 +0100
commit502069f7bf3a0c34a5f68413f21d5ea297a3cbcd (patch)
tree0372be7afa0f4609e14926f762260e4810e98796 /testing/ruby-github-markup/APKBUILD
parent97dad7e357527752857b908b295f45762a643ac7 (diff)
downloadaports-502069f7bf3a0c34a5f68413f21d5ea297a3cbcd.tar.bz2
aports-502069f7bf3a0c34a5f68413f21d5ea297a3cbcd.tar.xz
main/openssh: security fix for CVE-2016-0777 and CVE-2016-0778
CVE-2016-0777 An information leak (memory disclosure) can be exploited by a rogue SSH server to trick a client into leaking sensitive data from the client memory, including for example private keys. CVE-2016-0778 A buffer overflow (leading to file descriptor leak), can also be exploited by a rogue SSH server, but due to another bug in the code is possibly not exploitable, and only under certain conditions (not the default configuration), when using ProxyCommand, ForwardAgent or ForwardX11. fixes #5016
Diffstat (limited to 'testing/ruby-github-markup/APKBUILD')
0 files changed, 0 insertions, 0 deletions