Bug#841884: openssh: CVE-2016-8858: Memory exhaustion due to unregistered KEXINIT handler after receiving message

2016-10-24 Thread Salvatore Bonaccorso
Source: openssh Version: 1:6.7p1-5 Severity: normal Tags: security upstream Hi, the following vulnerability was published for openssh. CVE-2016-8858[0]: |Memory exhaustion due to unregistered KEXINIT handler after receiving |message If you fix the vulnerability please also make sure to include

Bug#841982: ssh: Allow StrictModes inside a Match User block

2016-10-24 Thread Peter Chubb
Package: ssh Version: 1:6.7p1-5+deb8u3 Severity: wishlist Dear Maintainer, It'd be really nice to be able to turn StrictModes off in sshd_config only for particular users. But currently, StrictModes is not permitted inside a Match User block. -- System Information: Debian Release: 8.5 APT

Processing of openssh_7.3p1-2_source.changes

2016-10-24 Thread Debian FTP Masters
openssh_7.3p1-2_source.changes uploaded successfully to localhost along with the files: openssh_7.3p1-2.dsc openssh_7.3p1-2.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#841884: marked as done (openssh: CVE-2016-8858: Memory exhaustion due to unregistered KEXINIT handler after receiving message)

2016-10-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Oct 2016 11:42:28 + with message-id and subject line Bug#841884: fixed in openssh 1:7.3p1-2 has caused the Debian Bug report #841884, regarding openssh: CVE-2016-8858: Memory exhaustion due to unregistered KEXINIT handler after

openssh_7.3p1-2_source.changes ACCEPTED into unstable

2016-10-24 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 24 Oct 2016 11:18:00 +0100 Source: openssh Binary: openssh-client openssh-client-ssh1 openssh-server openssh-sftp-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source