Back to bug 1298032
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Huzaifa S. Sidhpurwala | 2016-01-13 03:41:49 UTC | CC | security-response-team | |
| Red Hat Bugzilla | 2016-01-13 03:41:49 UTC | Doc Type | --- | Bug Fix |
| Huzaifa S. Sidhpurwala | 2016-01-13 04:07:06 UTC | Blocks | 1298034 | |
| Huzaifa S. Sidhpurwala | 2016-01-13 10:04:19 UTC | Whiteboard | impact=moderate,public=no,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-5/openssh=notaffected,rhel-6/openssh=new,rhel-7/openssh=new,fedora-all/openssh=new | impact=moderate,public=no,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=notaffected,fedora-all/openssh=affected |
| Tomas Hoger | 2016-01-13 13:06:03 UTC | Whiteboard | impact=moderate,public=no,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=notaffected,fedora-all/openssh=affected | impact=moderate,public=20160114,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-4/openssh=notaffected,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=affected,fedora-all/openssh=affected |
| Huzaifa S. Sidhpurwala | 2016-01-13 14:14:46 UTC | Depends On | 1298217 | |
| Huzaifa S. Sidhpurwala | 2016-01-13 14:14:56 UTC | Depends On | 1298218 | |
| Huzaifa S. Sidhpurwala | 2016-01-14 04:08:00 UTC | Comment 4 is private | 1 | 0 |
| Mark J. Cox | 2016-01-14 15:01:58 UTC | CC | mjc | |
| Martin Prpič | 2016-01-14 15:18:08 UTC | Summary | EMBARGOED CVE-2016-0777 OpenSSH: Client Information leak due to use of roaming connection feature | CVE-2016-0777 OpenSSH: Client Information leak due to use of roaming connection feature |
| Martin Prpič | 2016-01-14 15:18:10 UTC | Group | security, qe_staff | |
| Martin Prpič | 2016-01-14 15:19:24 UTC | Depends On | 1298626 | |
| Tim Hughes | 2016-01-14 15:52:03 UTC | CC | thughes | |
| Tomas Hoger | 2016-01-14 15:53:47 UTC | Fixed In Version | openssh 7.1p2 | |
| Norman Sardella | 2016-01-14 16:01:41 UTC | CC | sardella | |
| Martin Prpič | 2016-01-14 16:12:39 UTC | Doc Text | An information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client. | |
| Christoph Erhardt | 2016-01-14 16:53:00 UTC | CC | fedora | |
| Robert Scheck | 2016-01-14 17:28:05 UTC | CC | redhat-bugzilla | |
| Jonathan Moore | 2016-01-14 18:25:53 UTC | CC | jonathan.moore | |
| Trevor Hemsley | 2016-01-14 19:59:25 UTC | CC | trevor.hemsley | |
| Tomas Hoger | 2016-01-14 20:54:54 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2016-01-14 15:54:54 UTC | |||
| Salvatore Bonaccorso | 2016-01-14 21:27:07 UTC | CC | carnil | |
| Jay Shin | 2016-01-15 06:40:25 UTC | CC | jaeshin | |
| Link ID | Red Hat Knowledge Base (Article) 2123781 | |||
| Jay Shin | 2016-01-15 06:40:50 UTC | Link ID | Red Hat Knowledge Base (Solution) 2126451 | |
| Tomas Hoger | 2016-01-15 07:41:30 UTC | Whiteboard | impact=moderate,public=20160114,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-4/openssh=notaffected,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=affected,fedora-all/openssh=affected | impact=moderate,public=20160114,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-4/openssh=notaffected,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=affected,fedora-all/openssh=affected,fedora-all/gsi-openssh=affected,epel-7/gsi-openssh=affected |
| Tomas Hoger | 2016-01-15 07:41:42 UTC | CC | mattias.ellert | |
| Tomas Hoger | 2016-01-15 07:43:02 UTC | Depends On | 1298817 | |
| Tomas Hoger | 2016-01-15 07:43:12 UTC | Depends On | 1298818 | |
| Ján Rusnačko | 2016-01-15 08:19:03 UTC | CC | jrusnack | |
| Whiteboard | impact=moderate,public=20160114,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-4/openssh=notaffected,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=affected,fedora-all/openssh=affected,fedora-all/gsi-openssh=affected,epel-7/gsi-openssh=affected | impact=moderate,public=20160114,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-4/openssh=notaffected,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=affected,fedora-all/openssh=affected,fedora-all/gsi-openssh=affected,epel-7/gsi-openssh=affected,cwe=CWE-682 | ||
| Frank Hirtz | 2016-01-15 20:40:49 UTC | CC | fhirtz | |
| Slawomir Czarko | 2016-01-18 10:03:03 UTC | CC | slawomir | |
| Tomas Mraz | 2016-02-09 08:25:12 UTC | CC | tmraz | |
| Product Security DevOps Team | 2019-09-29 13:42:36 UTC | Whiteboard | impact=moderate,public=20160114,reported=20160113,source=distros,cvss2=4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N,rhel-4/openssh=notaffected,rhel-5/openssh=notaffected,rhel-6/openssh=notaffected,rhel-7/openssh=affected,fedora-all/openssh=affected,fedora-all/gsi-openssh=affected,epel-7/gsi-openssh=affected,cwe=CWE-682 |
Back to bug 1298032