Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:0606-1

Опубликовано: 06 мар. 2017
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

Security issues fixed:

  • CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)
  • CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)
  • CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

Non security issues fixed:

  • Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
openssh-6.2p2-0.40.1
openssh-askpass-6.2p2-0.40.1
openssh-askpass-gnome-6.2p2-0.40.3
SUSE Linux Enterprise Server 11 SP3-LTSS
openssh-6.2p2-0.40.1
openssh-askpass-6.2p2-0.40.1
openssh-askpass-gnome-6.2p2-0.40.3
SUSE Linux Enterprise Server 11 SP3-TERADATA
openssh-6.2p2-0.40.1
openssh-askpass-6.2p2-0.40.1
openssh-askpass-gnome-6.2p2-0.40.3
SUSE Manager 2.1
openssh-6.2p2-0.40.1
openssh-askpass-6.2p2-0.40.1
openssh-askpass-gnome-6.2p2-0.40.3
SUSE Manager Proxy 2.1
openssh-6.2p2-0.40.1
openssh-askpass-6.2p2-0.40.1
openssh-askpass-gnome-6.2p2-0.40.3
SUSE OpenStack Cloud 5
openssh-6.2p2-0.40.1
openssh-askpass-6.2p2-0.40.1
openssh-askpass-gnome-6.2p2-0.40.3

Описание

Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-6.2p2-0.40.1
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-askpass-6.2p2-0.40.1
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-askpass-gnome-6.2p2-0.40.3
SUSE Linux Enterprise Server 11 SP3-LTSS:openssh-6.2p2-0.40.1

Ссылки

Описание

authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-6.2p2-0.40.1
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-askpass-6.2p2-0.40.1
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-askpass-gnome-6.2p2-0.40.3
SUSE Linux Enterprise Server 11 SP3-LTSS:openssh-6.2p2-0.40.1

Ссылки

Описание

** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-6.2p2-0.40.1
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-askpass-6.2p2-0.40.1
SUSE Linux Enterprise Point of Sale 11 SP3:openssh-askpass-gnome-6.2p2-0.40.3
SUSE Linux Enterprise Server 11 SP3-LTSS:openssh-6.2p2-0.40.1

Ссылки