SUSE-SU-2016:2555-1

Source
https://www.suse.com/support/update/announcement/2016/suse-su-20162555-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:2555-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:2555-1
Related
Published
2016-10-17T14:52:50Z
Modified
2016-10-17T14:52:50Z
Summary
Security update for openssh-openssl1
Details

This update for openssh-openssl1 fixes the following issues:

Security issues fixed: - CVE-2016-6210: Prevent user enumeration through the timing of password processing (bsc#989363) - CVE-2016-6515: limit accepted password length (prevents possible DoS) (bsc#992533) - CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632) - CVE-2016-1908: prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313) - CVE-2015-8325: ignore PAM environment when using login (bsc#975865) - Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902) - Allow lowering the DH groups parameter limit in server as well as when GSSAPI key exchange is used (bsc#948902)

Bugs fixed: - avoid complaining about unset DISPLAY variable (bsc#981654) - Correctly parse GSSAPI KEX algorithms (bsc#961368) - more verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414) - fix PRNG re-seeding (bsc#960414, bsc#729190) - Allow empty Match blocks (bsc#961494)

References

Affected packages

SUSE:Linux Enterprise Server 11-SECURITY / openssh-openssl1

Package

Name
openssh-openssl1
Purl
purl:rpm/suse/openssh-openssl1&distro=SUSE%20Linux%20Enterprise%20Server%2011-SECURITY

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-15.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-openssl1": "6.6p1-15.1",
            "openssh-openssl1-helpers": "6.6p1-15.1"
        }
    ]
}