Security update for openssh
Announcement ID: | SUSE-SU-2016:1528-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities and has seven security fixes can now be installed.
Description:
openssh was updated to fix three security issues.
These security issues were fixed: - CVE-2016-3115: Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH allowed remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions (bsc#970632). - CVE-2016-1908: Possible fallback from untrusted to trusted X11 forwarding (bsc#962313). - CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes (bsc#975865).
These non-security issues were fixed: - Correctly parse GSSAPI KEX algorithms (bsc#961368) - More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414) - Fix PRNG re-seeding (bsc#960414, bsc#729190) - Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902) - Allow empty Match blocks (bsc#961494)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-openssh-12603=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-openssh-12603=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- openssh-helpers-6.6p1-21.1
- openssh-6.6p1-21.1
- openssh-fips-6.6p1-21.1
- openssh-askpass-gnome-6.6p1-21.3
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- openssh-helpers-6.6p1-21.1
- openssh-6.6p1-21.1
- openssh-fips-6.6p1-21.1
- openssh-askpass-gnome-6.6p1-21.3
References:
- https://www.suse.com/security/cve/CVE-2015-8325.html
- https://www.suse.com/security/cve/CVE-2016-1908.html
- https://www.suse.com/security/cve/CVE-2016-3115.html
- https://bugzilla.suse.com/show_bug.cgi?id=729190
- https://bugzilla.suse.com/show_bug.cgi?id=932483
- https://bugzilla.suse.com/show_bug.cgi?id=948902
- https://bugzilla.suse.com/show_bug.cgi?id=960414
- https://bugzilla.suse.com/show_bug.cgi?id=961368
- https://bugzilla.suse.com/show_bug.cgi?id=961494
- https://bugzilla.suse.com/show_bug.cgi?id=962313
- https://bugzilla.suse.com/show_bug.cgi?id=965576
- https://bugzilla.suse.com/show_bug.cgi?id=970632
- https://bugzilla.suse.com/show_bug.cgi?id=975865