File _patchinfo of Package patchinfo.360
<patchinfo incident="360"> <packager>msmeissn</packager> <issue tracker="cve" id="2016-077"></issue> <issue tracker="cve" id="2016-0777"></issue> <issue tracker="cve" id="2016-0778"></issue> <issue tracker="bnc" id="961642">VUL-0: CVE-2016-0777: openssh: Information leak in ssh client</issue> <issue tracker="bnc" id="961645">VUL-0: CVE-2016-0778: openssh: Buffer overflow in roaming code</issue> <category>security</category> <rating>critical</rating> <summary>security update for openssh</summary> <description> - CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642) - CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645) This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.</description> </patchinfo>