Source: openssh
Version: 1:6.7p1-5
Severity: normal
Tags: security upstream
Hi,
the following vulnerability was published for openssh.
CVE-2016-8858[0]:
|Memory exhaustion due to unregistered KEXINIT handler after receiving
|message
If you fix the vulnerability please also make sure to include
Package: ssh
Version: 1:6.7p1-5+deb8u3
Severity: wishlist
Dear Maintainer,
It'd be really nice to be able to turn StrictModes off in sshd_config only
for particular users. But currently, StrictModes is not permitted inside
a Match User block.
-- System Information:
Debian Release: 8.5
APT
openssh_7.3p1-2_source.changes uploaded successfully to localhost
along with the files:
openssh_7.3p1-2.dsc
openssh_7.3p1-2.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Mon, 24 Oct 2016 11:42:28 +
with message-id
and subject line Bug#841884: fixed in openssh 1:7.3p1-2
has caused the Debian Bug report #841884,
regarding openssh: CVE-2016-8858: Memory exhaustion due to unregistered KEXINIT
handler after
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 24 Oct 2016 11:18:00 +0100
Source: openssh
Binary: openssh-client openssh-client-ssh1 openssh-server openssh-sftp-server
ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source
5 matches
Mail list logo