SUSE-SU-2016:0117-1

Source
https://www.suse.com/support/update/announcement/2016/suse-su-20160117-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:0117-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:0117-1
Related
Published
2016-01-14T15:34:05Z
Modified
2016-01-14T15:34:05Z
Summary
Security update for openssh-openssl1
Details

This update for openssh-openssl1 fixes the following issues:

  • CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
  • CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.

References

Affected packages

SUSE:Linux Enterprise Server 11-SECURITY / openssh-openssl1

Package

Name
openssh-openssl1
Purl
purl:rpm/suse/openssh-openssl1&distro=SUSE%20Linux%20Enterprise%20Server%2011-SECURITY

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-10.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-openssl1": "6.6p1-10.1",
            "openssh-openssl1-helpers": "6.6p1-10.1"
        }
    ]
}