[arch-security] openssh: workaround for critical vulnerability
14 Jan
2016
14 Jan
'16
3:21 p.m.
Summary ======= A critical client side SSH vulnerability has been discovered and a patched upstream version is released as 7.1p2. We strongly advise to use the following workaround until the upcoming release is rolled out in Arch Linux. This vulnerability is being tracked as CVE-2016-0777. Workaround ========== Add undocumented "UseRoaming no" to ssh_config or use "-oUseRoaming=no" work around the issue. References ========== https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-January/034680.htm... https://www.marc.info/?l=openbsd-tech&m=145278077820529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777
14 Jan
14 Jan
3:46 p.m.
just for the logs: the mass mail spam was not my fault :P cheers, anthraxx
3310
Age (days ago)
3310
Last active (days ago)
1 comments
1 participants
participants (1)
-
Levente Polyak