<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">openssh-7.2p2-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10174</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">openssh-7.2p2-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the openssh-7.2p2-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10174</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10174</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8325/</URL>
      <Description>SUSE CVE CVE-2015-8325 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0777/</URL>
      <Description>SUSE CVE CVE-2016-0777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0778/</URL>
      <Description>SUSE CVE CVE-2016-0778 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6210/</URL>
      <Description>SUSE CVE CVE-2016-6210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6515/</URL>
      <Description>SUSE CVE CVE-2016-6515 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openssh-7.2p2-3.1">
      <FullProductName ProductID="openssh-7.2p2-3.1">openssh-7.2p2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-cavs-7.2p2-3.1">
      <FullProductName ProductID="openssh-cavs-7.2p2-3.1">openssh-cavs-7.2p2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-fips-7.2p2-3.1">
      <FullProductName ProductID="openssh-fips-7.2p2-3.1">openssh-fips-7.2p2-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-helpers-7.2p2-3.1">
      <FullProductName ProductID="openssh-helpers-7.2p2-3.1">openssh-helpers-7.2p2-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openssh-7.2p2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssh-7.2p2-3.1">openssh-7.2p2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-cavs-7.2p2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssh-cavs-7.2p2-3.1">openssh-cavs-7.2p2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-fips-7.2p2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssh-fips-7.2p2-3.1">openssh-fips-7.2p2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-helpers-7.2p2-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssh-helpers-7.2p2-3.1">openssh-helpers-7.2p2-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.</Note>
    </Notes>
    <CVE>CVE-2015-8325</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openssh-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-cavs-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-fips-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-helpers-7.2p2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8325.html</URL>
        <Description>CVE-2015-8325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138392</URL>
        <Description>SUSE Bug 1138392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975865</URL>
        <Description>SUSE Bug 975865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996040</URL>
        <Description>SUSE Bug 996040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.</Note>
    </Notes>
    <CVE>CVE-2016-0777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openssh-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-cavs-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-fips-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-helpers-7.2p2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0777.html</URL>
        <Description>CVE-2016-0777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961642</URL>
        <Description>SUSE Bug 961642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996040</URL>
        <Description>SUSE Bug 996040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.</Note>
    </Notes>
    <CVE>CVE-2016-0778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openssh-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-cavs-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-fips-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-helpers-7.2p2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0778.html</URL>
        <Description>CVE-2016-0778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961645</URL>
        <Description>SUSE Bug 961645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996040</URL>
        <Description>SUSE Bug 996040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.</Note>
    </Notes>
    <CVE>CVE-2016-6210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openssh-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-cavs-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-fips-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-helpers-7.2p2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6210.html</URL>
        <Description>CVE-2016-6210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001712</URL>
        <Description>SUSE Bug 1001712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010950</URL>
        <Description>SUSE Bug 1010950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105010</URL>
        <Description>SUSE Bug 1105010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138392</URL>
        <Description>SUSE Bug 1138392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989363</URL>
        <Description>SUSE Bug 989363</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.</Note>
    </Notes>
    <CVE>CVE-2016-6515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openssh-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-cavs-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-fips-7.2p2-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssh-helpers-7.2p2-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6515.html</URL>
        <Description>CVE-2016-6515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010950</URL>
        <Description>SUSE Bug 1010950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992533</URL>
        <Description>SUSE Bug 992533</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
