<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: USN-2869-1: OpenSSH vulnerabilities &#124; Ubuntu</title>
	<atom:link href="http://www.epanorama.net/blog/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 10 Apr 2026 21:14:09 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/comment-page-1/#comment-1467135</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 09:34:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37935#comment-1467135</guid>
		<description><![CDATA[Related posting: http://www.epanorama.net/newepa/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/]]></description>
		<content:encoded><![CDATA[<p>Related posting: <a href="http://www.epanorama.net/newepa/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/" rel="nofollow">http://www.epanorama.net/newepa/2016/01/15/openssh-client-bugs-cve-2016-0777-and-cve-2016-0778/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/01/15/usn-2869-1-openssh-vulnerabilities-ubuntu/comment-page-1/#comment-1467134</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 09:34:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=37935#comment-1467134</guid>
		<description><![CDATA[USN-2869-1: OpenSSH vulnerabilities
http://www.ubuntu.com/usn/usn-2869-1/

Details
It was discovered that the OpenSSH client experimental support for resuming
connections contained multiple security issues. A malicious server could
use this issue to leak client memory to the server, including private
client user keys.

OpenSSH: client bugs CVE-2016-0777 and CVE-2016-0778
http://undeadly.org/cgi?action=article&amp;sid=20160114142733

This is the most serious bug you’ll hear about this week: the issues identified and fixed in OpenSSH are dubbed CVE-2016-0777 and CVE-2016-0778.
An early heads up came from Theo de Raadt in this mailing list posting.
Until you are able to patch affected systems, the recommended workaround is to use

UPDATE: This affects OpenSSH versions 5.4 through 7.1.
UPDATE: The following commit from deraadt@ has just gone in:
CVSROOT: /cvs
Module name: src
Changes by: deraadt@cvs.openbsd.org 2016/01/14 07:34:34

Modified files:
usr.bin/ssh : readconf.c ssh.c

Log message:
Disable experimental client-side roaming support. Server side was
disabled/gutted for years already, but this aspect was surprisingly
forgotten. Thanks for report from Qualys]]></description>
		<content:encoded><![CDATA[<p>USN-2869-1: OpenSSH vulnerabilities<br />
<a href="http://www.ubuntu.com/usn/usn-2869-1/" rel="nofollow">http://www.ubuntu.com/usn/usn-2869-1/</a></p>
<p>Details<br />
It was discovered that the OpenSSH client experimental support for resuming<br />
connections contained multiple security issues. A malicious server could<br />
use this issue to leak client memory to the server, including private<br />
client user keys.</p>
<p>OpenSSH: client bugs CVE-2016-0777 and CVE-2016-0778<br />
<a href="http://undeadly.org/cgi?action=article&#038;sid=20160114142733" rel="nofollow">http://undeadly.org/cgi?action=article&#038;sid=20160114142733</a></p>
<p>This is the most serious bug you’ll hear about this week: the issues identified and fixed in OpenSSH are dubbed CVE-2016-0777 and CVE-2016-0778.<br />
An early heads up came from Theo de Raadt in this mailing list posting.<br />
Until you are able to patch affected systems, the recommended workaround is to use</p>
<p>UPDATE: This affects OpenSSH versions 5.4 through 7.1.<br />
UPDATE: The following commit from deraadt@ has just gone in:<br />
CVSROOT: /cvs<br />
Module name: src<br />
Changes by: <a href="mailto:deraadt@cvs.openbsd.org">deraadt@cvs.openbsd.org</a> 2016/01/14 07:34:34</p>
<p>Modified files:<br />
usr.bin/ssh : readconf.c ssh.c</p>
<p>Log message:<br />
Disable experimental client-side roaming support. Server side was<br />
disabled/gutted for years already, but this aspect was surprisingly<br />
forgotten. Thanks for report from Qualys</p>
]]></content:encoded>
	</item>
</channel>
</rss>
