Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2017:0674-1

Опубликовано: 13 мар. 2017
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2016-8858: prevent resource depletion during key exchange (bsc#1005480)

  • CVE-2016-10009: limit directories for loading PKCS11 modules to avoid privilege escalation (bsc#1016366)

  • CVE-2016-10011: Prevent possible leaks of host private keys to low-privilege process handling authentication (bsc#1016369)

  • Fix suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221)

  • Properly verify CIDR masks in the AllowUsers and DenyUsers configuration lists (bsc#1005893)

This update was imported from the SUSE:SLE-12:Update update project.

Список пакетов

openSUSE Leap 42.1
openssh-6.6p1-17.1
openssh-askpass-gnome-6.6p1-17.1
openssh-cavs-6.6p1-17.1
openssh-fips-6.6p1-17.1
openssh-helpers-6.6p1-17.1

Описание

Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.


Затронутые продукты
openSUSE Leap 42.1:openssh-6.6p1-17.1
openSUSE Leap 42.1:openssh-askpass-gnome-6.6p1-17.1
openSUSE Leap 42.1:openssh-cavs-6.6p1-17.1
openSUSE Leap 42.1:openssh-fips-6.6p1-17.1

Ссылки

Описание

authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.


Затронутые продукты
openSUSE Leap 42.1:openssh-6.6p1-17.1
openSUSE Leap 42.1:openssh-askpass-gnome-6.6p1-17.1
openSUSE Leap 42.1:openssh-cavs-6.6p1-17.1
openSUSE Leap 42.1:openssh-fips-6.6p1-17.1

Ссылки

Описание

** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."


Затронутые продукты
openSUSE Leap 42.1:openssh-6.6p1-17.1
openSUSE Leap 42.1:openssh-askpass-gnome-6.6p1-17.1
openSUSE Leap 42.1:openssh-cavs-6.6p1-17.1
openSUSE Leap 42.1:openssh-fips-6.6p1-17.1

Ссылки
Уязвимость openSUSE-SU-2017:0674-1