[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2016:1528-1 -- SLES openssh

ID: oval:org.secpod.oval:def:89045158Date: (C)2021-08-03   (M)2023-12-07
Class: PATCHFamily: unix




openssh was updated to fix three security issues. These security issues were fixed: - CVE-2016-3115: Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH allowed remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the do_authenticated1 and session_x11_req functions . - CVE-2016-1908: Possible fallback from untrusted to trusted X11 forwarding . - CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes . These non-security issues were fixed: - Correctly parse GSSAPI KEX algorithms - More verbose FIPS mode/CC related documentation in README.FIPS - Fix PRNG re-seeding - Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option - Allow empty Match blocks

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
openssh
Reference:
SUSE-SU-2016:1528-1
CVE-2015-8325
CVE-2016-1908
CVE-2016-3115
CVE    3
CVE-2016-3115
CVE-2015-8325
CVE-2016-1908
CPE    2
cpe:/a:openbsd:openssh
cpe:/o:suse:suse_linux_enterprise_server:11:sp4

© SecPod Technologies