File _patchinfo of Package patchinfo.5136

<patchinfo incident="5136">
  <issue id="945493" tracker="bnc">Can't connect to lich.qam.suse.de after the update</issue>
  <issue id="945484" tracker="bnc">openssh deamon fails to restart after update</issue>
  <issue id="947458" tracker="bnc">L3-Question: sftp chroot failure after update to SLES 11 SP4</issue>
  <issue id="729190" tracker="bnc">prng patch in openssh does not handle overflow in seeding</issue>
  <issue id="932483" tracker="bnc">VUL-1: openssh: The Logjam Attack / weakdh.org</issue>
  <issue id="948902" tracker="bnc">sftp failures after installation of openssh 6.2p2-0.21.1</issue>
  <issue id="960414" tracker="bnc">sftp upload fails at 36gb, using sftp from openSSH</issue>
  <issue id="961368" tracker="bnc">ssh+kerberos: GSSAPIKeyExchange does not work</issue>
  <issue id="962313" tracker="bnc">VUL-1: CVE-2016-1908: openssh: possible fallback from untrusted to trusted X11 forwarding</issue>
  <issue id="965576" tracker="bnc">openssh daemon does not start in FIPS mode</issue>
  <issue id="970632" tracker="bnc">VUL-0: CVE-2016-3115: openssh: Missing sanitisation of untrusted input allows anauthenticated user who is able to request X11 forw...</issue>
  <issue id="975865" tracker="bnc">VUL-0: CVE-2015-8325: openssh: ignore PAM environment vars when UseLogin=yes</issue>
  <issue id="CVE-2015-8325" tracker="cve" />
  <issue id="CVE-2016-1908" tracker="cve" />
  <issue id="CVE-2016-3115" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>pcerny</packager>
  <description>This update for OpenSSH fixes three security issues.

These security issues were fixed:
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: Prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313)
- CVE-2015-8325: Ignore PAM environment when using login (bsc#975865)

These non-security issues were fixed:
- Fix help output of sftp (bsc#945493)
- Restarting openssh with openssh-fips installed was not working correctly (bsc#945484)
- Fix crashes when /proc is not available in the chroot (bsc#947458)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414)
- Fix PRNG re-seeding (bsc#960414, bsc#729190)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)

This update was imported from the SUSE:SLE-12:Update update project.</description>
  <summary>Security update for openssh</summary>
</patchinfo>
openSUSE Build Service is sponsored by