SUSE: 2019:14016-1 moderate: openssh

    Date11 Apr 2019
    CategorySuSE
    681
    Posted ByLinuxSecurity Advisories
    An update that solves two vulnerabilities and has four fixes is now available.
    
       SUSE Security Update: Security update for openssh
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2019:14016-1
    Rating:             moderate
    References:         #1090671 #1115550 #1119183 #1121816 #1121821 
                        #1131709 
    Cross-References:   CVE-2019-6109 CVE-2019-6111
    Affected Products:
                        SUSE Linux Enterprise Point of Sale 11-SP3
                        SUSE Linux Enterprise Debuginfo 11-SP3
    ______________________________________________________________________________
    
       An update that solves two vulnerabilities and has four
       fixes is now available.
    
    Description:
    
       This update for openssh fixes the following issues:
    
       Security vulnerabilities addressed:
    
       - CVE-2019-6109: Fixed an character encoding issue in the progress display
         of the scp client that could be used to manipulate client output,
         allowing for spoofing during file transfers (bsc#1121816).
       - CVE-2019-6111: Properly validate object names received by the scp client
         to prevent arbitrary file overwrites when interacting with a malicious
         SSH server (bsc#1121821).
    
       Other issues fixed:
    
       - Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
       - Returned proper reason for port forwarding failures (bsc#1090671).
       - Fixed SSHD termination of multichannel sessions with non-root users
         (bsc#1115550).
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Point of Sale 11-SP3:
    
          zypper in -t patch sleposp3-openssh-14016=1
    
       - SUSE Linux Enterprise Debuginfo 11-SP3:
    
          zypper in -t patch dbgsp3-openssh-14016=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
    
          openssh-6.6p1-41.18.1
          openssh-askpass-gnome-6.6p1-41.18.1
    
       - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
    
          openssh-askpass-gnome-debuginfo-6.6p1-41.18.1
          openssh-debuginfo-6.6p1-41.18.1
          openssh-debugsource-6.6p1-41.18.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2019-6109.html
       https://www.suse.com/security/cve/CVE-2019-6111.html
       https://bugzilla.suse.com/1090671
       https://bugzilla.suse.com/1115550
       https://bugzilla.suse.com/1119183
       https://bugzilla.suse.com/1121816
       https://bugzilla.suse.com/1121821
       https://bugzilla.suse.com/1131709
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://lists.suse.com/mailman/listinfo/sle-security-updates
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":100,"resources":[]},{"id":"67","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.