Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:0607-1

Опубликовано: 06 мар. 2017
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)

  • CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)

  • CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

  • Fix suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221)

  • Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)

Список пакетов

SUSE Linux Enterprise Server 12 SP1
openssh-6.6p1-54.7.1
openssh-askpass-gnome-6.6p1-54.7.1
openssh-fips-6.6p1-54.7.1
openssh-helpers-6.6p1-54.7.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-6.6p1-54.7.1
openssh-askpass-gnome-6.6p1-54.7.1
openssh-fips-6.6p1-54.7.1
openssh-helpers-6.6p1-54.7.1

Описание

Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1:openssh-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-askpass-gnome-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-fips-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-helpers-6.6p1-54.7.1

Ссылки

Описание

authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1:openssh-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-askpass-gnome-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-fips-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-helpers-6.6p1-54.7.1

Ссылки

Описание

** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."


Затронутые продукты
SUSE Linux Enterprise Server 12 SP1:openssh-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-askpass-gnome-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-fips-6.6p1-54.7.1
SUSE Linux Enterprise Server 12 SP1:openssh-helpers-6.6p1-54.7.1

Ссылки
Уязвимость SUSE-SU-2017:0607-1