File _patchinfo of Package patchinfo.1814
<patchinfo incident="1814">
<issue id="961645" tracker="bnc">VUL-0: CVE-2016-0778: openssh: Buffer overflow in roaming code</issue>
<issue id="961642" tracker="bnc">VUL-0: CVE-2016-0777: openssh: Information leak in ssh client</issue>
<issue id="CVE-2016-0777" tracker="cve" />
<issue id="CVE-2016-0778" tracker="cve" />
<category>security</category>
<rating>critical</rating>
<packager>jsegitz</packager>
<description>
This update for openssh fixes the following issues:
- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)
This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
</description>
<summary>Security update for openssh</summary>
</patchinfo>