SUSE-SU-2017:0603-1: moderate: Security update for openssh

sle-security-updates at sle-security-updates at
Fri Mar 3 13:10:26 MST 2017

   SUSE Security Update: Security update for openssh

Announcement ID:    SUSE-SU-2017:0603-1
Rating:             moderate
References:         #1005480 #1005893 #1006221 #1016366 #1016369 
Cross-References:   CVE-2016-10009 CVE-2016-10011 CVE-2016-8858
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4

   An update that solves three vulnerabilities and has two
   fixes is now available.


   This update for openssh fixes the following issues:

   Security issues fixed:
   - CVE-2016-8858: prevent resource depletion during key exchange
   - CVE-2016-10009: limit directories for loading PKCS11 modules to avoid
     privilege escalation (bsc#1016366)
   - CVE-2016-10011: Prevent possible leaks of host private keys to
     low-privilege process handling authentication (bsc#1016369)

   Non security issues fixed:
   - Properly verify CIDR masks in the AllowUsers and DenyUsers configuration
     lists (bsc#1005893)
   - fix suggested command for removing conflicting server keys from the
     known_hosts file (bsc#1006221)

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-openssh-13002=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-openssh-13002=1

   To bring your system up-to-date, use "zypper patch".

Package List:

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):


   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):



More information about the sle-security-updates mailing list