Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:0118-1

Опубликовано: 14 янв. 2016
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
  • CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.

Список пакетов

SUSE Linux Enterprise Desktop 12
openssh-6.6p1-33.1
openssh-askpass-gnome-6.6p1-33.1
openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1
openssh-6.6p1-33.1
openssh-askpass-gnome-6.6p1-33.1
openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server 12
openssh-6.6p1-33.1
openssh-askpass-gnome-6.6p1-33.1
openssh-fips-6.6p1-33.1
openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1
openssh-6.6p1-33.1
openssh-askpass-gnome-6.6p1-33.1
openssh-fips-6.6p1-33.1
openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12
openssh-6.6p1-33.1
openssh-askpass-gnome-6.6p1-33.1
openssh-fips-6.6p1-33.1
openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-6.6p1-33.1
openssh-askpass-gnome-6.6p1-33.1
openssh-fips-6.6p1-33.1
openssh-helpers-6.6p1-33.1

Описание

The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-6.6p1-33.1

Ссылки

Описание

The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-6.6p1-33.1

Ссылки
Уязвимость SUSE-SU-2016:0118-1