Security update for openssh

SUSE Security Update: Security update for openssh
Announcement ID: SUSE-SU-2016:0120-1
Rating: critical
References: #961642 #961645
Affected Products:
  • SUSE Linux Enterprise Server 11-SP4
  • SUSE Linux Enterprise Desktop 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP4

  • An update that fixes two vulnerabilities is now available.

    Description:


    This update for openssh fixes the following issues:

    - CVE-2016-0777: A malicious or compromised server could cause the OpenSSH
    client to expose part or all of the client's private key through the
    roaming feature (bsc#961642)
    - CVE-2016-0778: A malicious or compromised server could could trigger a
    buffer overflow in the OpenSSH client through the roaming feature
    (bsc#961645)

    This update disables the undocumented feature supported by the OpenSSH
    client and a commercial SSH server.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11-SP4:
      zypper in -t patch slessp4-openssh-2016011302-12326=1
    • SUSE Linux Enterprise Desktop 11-SP4:
      zypper in -t patch sledsp4-openssh-2016011302-12326=1
    • SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-openssh-2016011302-12326=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • openssh-6.6p1-16.1
      • openssh-askpass-gnome-6.6p1-16.4
      • openssh-fips-6.6p1-16.1
      • openssh-helpers-6.6p1-16.1
    • SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
      • openssh-6.6p1-16.1
      • openssh-askpass-gnome-6.6p1-16.4
      • openssh-helpers-6.6p1-16.1
    • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • openssh-askpass-gnome-debuginfo-6.6p1-16.4
      • openssh-debuginfo-6.6p1-16.1
      • openssh-debugsource-6.6p1-16.1

    References: