SUSE-SU-2016:1528-1

Source
https://www.suse.com/support/update/announcement/2016/suse-su-20161528-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:1528-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:1528-1
Related
Published
2016-06-08T10:46:21Z
Modified
2016-06-08T10:46:21Z
Summary
Security update for openssh
Details

openssh was updated to fix three security issues.

These security issues were fixed: - CVE-2016-3115: Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH allowed remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) doauthenticated1 and (2) sessionx11_req functions (bsc#970632). - CVE-2016-1908: Possible fallback from untrusted to trusted X11 forwarding (bsc#962313). - CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes (bsc#975865).

These non-security issues were fixed: - Correctly parse GSSAPI KEX algorithms (bsc#961368) - More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414) - Fix PRNG re-seeding (bsc#960414, bsc#729190) - Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902) - Allow empty Match blocks (bsc#961494)

References

Affected packages

SUSE:Linux Enterprise Server 11 SP4 / openssh

Package

Name
openssh
Purl
purl:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-21.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-21.3",
            "openssh-fips": "6.6p1-21.1",
            "openssh-helpers": "6.6p1-21.1",
            "openssh": "6.6p1-21.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / openssh-askpass-gnome

Package

Name
openssh-askpass-gnome
Purl
purl:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-21.3

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-21.3",
            "openssh-fips": "6.6p1-21.1",
            "openssh-helpers": "6.6p1-21.1",
            "openssh": "6.6p1-21.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / openssh

Package

Name
openssh
Purl
purl:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-21.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-21.3",
            "openssh-fips": "6.6p1-21.1",
            "openssh-helpers": "6.6p1-21.1",
            "openssh": "6.6p1-21.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / openssh-askpass-gnome

Package

Name
openssh-askpass-gnome
Purl
purl:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-21.3

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-21.3",
            "openssh-fips": "6.6p1-21.1",
            "openssh-helpers": "6.6p1-21.1",
            "openssh": "6.6p1-21.1"
        }
    ]
}