SUSE-SU-2019:14016-1: moderate: Security update for openssh

sle-updates at sle-updates at
Thu Apr 11 13:09:28 MDT 2019

   SUSE Security Update: Security update for openssh

Announcement ID:    SUSE-SU-2019:14016-1
Rating:             moderate
References:         #1090671 #1115550 #1119183 #1121816 #1121821 
Cross-References:   CVE-2019-6109 CVE-2019-6111
Affected Products:
                    SUSE Linux Enterprise Point of Sale 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP3

   An update that solves two vulnerabilities and has four
   fixes is now available.


   This update for openssh fixes the following issues:

   Security vulnerabilities addressed:

   - CVE-2019-6109: Fixed an character encoding issue in the progress display
     of the scp client that could be used to manipulate client output,
     allowing for spoofing during file transfers (bsc#1121816).
   - CVE-2019-6111: Properly validate object names received by the scp client
     to prevent arbitrary file overwrites when interacting with a malicious
     SSH server (bsc#1121821).

   Other issues fixed:

   - Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
   - Returned proper reason for port forwarding failures (bsc#1090671).
   - Fixed SSHD termination of multichannel sessions with non-root users

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-openssh-14016=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-openssh-14016=1

Package List:

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):


   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):



More information about the sle-updates mailing list