Security update for openssh
SUSE Patch
security@suse.de
SUSE Security Team
SUSE-SU-2016:0118-1
Final
1
1
2016-01-14T15:33:10Z
current
2016-01-14T15:33:10Z
2016-01-14T15:33:10Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for openssh
This update for openssh fixes the following issues:
- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)
This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
SUSE-SLE-DESKTOP-12-2016-85,SUSE-SLE-DESKTOP-12-SP1-2016-85,SUSE-SLE-SERVER-12-2016-85,SUSE-SLE-SERVER-12-SP1-2016-85
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://www.suse.com/support/update/announcement/2016/suse-su-20160118-1/
Link for SUSE-SU-2016:0118-1
https://lists.suse.com/pipermail/sle-security-updates/2016-January/001803.html
E-Mail link for SUSE-SU-2016:0118-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
https://bugzilla.suse.com/961642
SUSE Bug 961642
https://bugzilla.suse.com/961645
SUSE Bug 961645
https://www.suse.com/security/cve/CVE-2016-0777/
SUSE CVE CVE-2016-0777 page
https://www.suse.com/security/cve/CVE-2016-0778/
SUSE CVE CVE-2016-0778 page
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-6.6p1-33.1
openssh-askpass-gnome-6.6p1-33.1
openssh-helpers-6.6p1-33.1
openssh-fips-6.6p1-33.1
openssh-6.6p1-33.1 as a component of SUSE Linux Enterprise Desktop 12
openssh-askpass-gnome-6.6p1-33.1 as a component of SUSE Linux Enterprise Desktop 12
openssh-helpers-6.6p1-33.1 as a component of SUSE Linux Enterprise Desktop 12
openssh-6.6p1-33.1 as a component of SUSE Linux Enterprise Desktop 12 SP1
openssh-askpass-gnome-6.6p1-33.1 as a component of SUSE Linux Enterprise Desktop 12 SP1
openssh-helpers-6.6p1-33.1 as a component of SUSE Linux Enterprise Desktop 12 SP1
openssh-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12
openssh-askpass-gnome-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12
openssh-fips-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12
openssh-helpers-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12
openssh-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12 SP1
openssh-askpass-gnome-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12 SP1
openssh-fips-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12 SP1
openssh-helpers-6.6p1-33.1 as a component of SUSE Linux Enterprise Server 12 SP1
openssh-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
openssh-askpass-gnome-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
openssh-fips-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
openssh-helpers-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12
openssh-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-askpass-gnome-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-fips-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-helpers-6.6p1-33.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
CVE-2016-0777
SUSE Linux Enterprise Desktop 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-33.1
critical
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2016/suse-su-20160118-1/
https://www.suse.com/security/cve/CVE-2016-0777.html
CVE-2016-0777
https://bugzilla.suse.com/961642
SUSE Bug 961642
https://bugzilla.suse.com/996040
SUSE Bug 996040
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
CVE-2016-0778
SUSE Linux Enterprise Desktop 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Desktop 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-33.1
SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-33.1
important
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2016/suse-su-20160118-1/
https://www.suse.com/security/cve/CVE-2016-0778.html
CVE-2016-0778
https://bugzilla.suse.com/961645
SUSE Bug 961645
https://bugzilla.suse.com/996040
SUSE Bug 996040