File _patchinfo of Package patchinfo.1821
<patchinfo incident="1821">
<issue id="945493" tracker="bnc">Can't connect to lich.qam.suse.de after the update</issue>
<issue id="945484" tracker="bnc">openssh deamon fails to restart after update</issue>
<issue id="947458" tracker="bnc">L3-Question: sftp chroot failure after update to SLES 11 SP4</issue>
<issue id="729190" tracker="bnc">prng patch in openssh does not handle overflow in seeding</issue>
<issue id="932483" tracker="bnc">VUL-1: openssh: The Logjam Attack / weakdh.org</issue>
<issue id="948902" tracker="bnc">sftp failures after installation of openssh 6.2p2-0.21.1</issue>
<issue id="960414" tracker="bnc">sftp upload fails at 36gb, using sftp from openSSH</issue>
<issue id="961368" tracker="bnc">ssh+kerberos: GSSAPIKeyExchange does not work</issue>
<issue id="962313" tracker="bnc">VUL-1: CVE-2016-1908: openssh: possible fallback from untrusted to trusted X11 forwarding</issue>
<issue id="965576" tracker="bnc">openssh daemon does not start in FIPS mode</issue>
<issue id="970632" tracker="bnc">VUL-0: CVE-2016-3115: openssh: Missing sanitisation of untrusted input allows anauthenticated user who is able to request X11 forw...</issue>
<issue id="975865" tracker="bnc">VUL-0: CVE-2015-8325: openssh: ignore PAM environment vars when UseLogin=yes</issue>
<issue id="CVE-2015-8325" tracker="cve" />
<issue id="CVE-2016-1908" tracker="cve" />
<issue id="CVE-2016-3115" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>pcerny</packager>
<description>This update for OpenSSH fixes three security issues.
These security issues were fixed:
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: Prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313)
- CVE-2015-8325: Ignore PAM environment when using login (bsc#975865)
These non-security issues were fixed:
- Fix help output of sftp (bsc#945493)
- Restarting openssh with openssh-fips installed was not working correctly (bsc#945484)
- Fix crashes when /proc is not available in the chroot (bsc#947458)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414)
- Fix PRNG re-seeding (bsc#960414, bsc#729190)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)
</description>
<summary>Security update for openssh</summary>
</patchinfo>