File _patchinfo of Package patchinfo.4527

<patchinfo incident="4527">
  <issue id="961645" tracker="bnc">VUL-0: CVE-2016-0778: openssh: Buffer overflow in roaming code</issue>
  <issue id="961642" tracker="bnc">VUL-0: CVE-2016-0777: openssh: Information leak in ssh client</issue>
  <issue id="CVE-2016-0777" tracker="cve" />
  <issue id="CVE-2016-0778" tracker="cve" />
  <category>security</category>
  <rating>critical</rating>
  <packager>AndreasStieger</packager>
  <description>
This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
</description>
  <summary>Security update for openssh</summary>
</patchinfo>
openSUSE Build Service is sponsored by