File _patchinfo of Package patchinfo.4527

<patchinfo incident="4527">
  <issue id="961645" tracker="bnc">VUL-0: CVE-2016-0778: openssh: Buffer overflow in roaming code</issue>
  <issue id="961642" tracker="bnc">VUL-0: CVE-2016-0777: openssh: Information leak in ssh client</issue>
  <issue id="CVE-2016-0777" tracker="cve" />
  <issue id="CVE-2016-0778" tracker="cve" />
This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
  <summary>Security update for openssh</summary>
openSUSE Build Service is sponsored by