SUSE-SU-2016:0120-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:0120-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:0120-1
Related
Published
2016-01-14T15:32:31Z
Modified
2016-01-14T15:32:31Z
Summary
Security update for openssh
Details

This update for openssh fixes the following issues:

  • CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
  • CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.

References

Affected packages

SUSE:Linux Enterprise Desktop 11 SP4 / openssh

Package

Name
openssh
Purl
purl:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-16.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-16.4",
            "openssh-helpers": "6.6p1-16.1",
            "openssh": "6.6p1-16.1"
        }
    ]
}

SUSE:Linux Enterprise Desktop 11 SP4 / openssh-askpass-gnome

Package

Name
openssh-askpass-gnome
Purl
purl:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-16.4

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-16.4",
            "openssh-helpers": "6.6p1-16.1",
            "openssh": "6.6p1-16.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / openssh

Package

Name
openssh
Purl
purl:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-16.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-16.4",
            "openssh-fips": "6.6p1-16.1",
            "openssh-helpers": "6.6p1-16.1",
            "openssh": "6.6p1-16.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / openssh-askpass-gnome

Package

Name
openssh-askpass-gnome
Purl
purl:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-16.4

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-16.4",
            "openssh-fips": "6.6p1-16.1",
            "openssh-helpers": "6.6p1-16.1",
            "openssh": "6.6p1-16.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / openssh

Package

Name
openssh
Purl
purl:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-16.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-16.4",
            "openssh-fips": "6.6p1-16.1",
            "openssh-helpers": "6.6p1-16.1",
            "openssh": "6.6p1-16.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / openssh-askpass-gnome

Package

Name
openssh-askpass-gnome
Purl
purl:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-16.4

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "6.6p1-16.4",
            "openssh-fips": "6.6p1-16.1",
            "openssh-helpers": "6.6p1-16.1",
            "openssh": "6.6p1-16.1"
        }
    ]
}