File _patchinfo of Package patchinfo.363
<patchinfo incident="363">
<packager>mkubecek</packager>
<issue tracker="cve" id="2016-077"></issue>
<issue tracker="cve" id="2016-0777"></issue>
<issue tracker="cve" id="2016-0778"></issue>
<issue tracker="bnc" id="961642">VUL-0: CVE-2016-0777: openssh: Information leak in ssh client</issue>
<issue tracker="bnc" id="961645">VUL-0: CVE-2016-0778: openssh: Buffer overflow in roaming code</issue>
<category>security</category>
<rating>critical</rating>
<summary>Security update for openssh</summary>
<description> - CVE-2016-0777: A malicious or compromised server could cause the OpenSSH
client to expose part or all of the client's private key through the
roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a
buffer overflow in the OpenSSH client through the roaming feature
(bsc#961645)
This update disables the undocumented feature supported by the OpenSSH
client and a commercial SSH server.</description>
</patchinfo>