<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0119-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-01-14T15:31:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-01-14T15:31:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-01-14T15:31:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sledsp3-openssh-2016011301-12325,slessp3-openssh-2016011301-12325</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160119-1/</URL>
      <Description>Link for SUSE-SU-2016:0119-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:0119-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/961642</URL>
      <Description>SUSE Bug 961642</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/961645</URL>
      <Description>SUSE Bug 961645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0777/</URL>
      <Description>SUSE CVE CVE-2016-0777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0778/</URL>
      <Description>SUSE CVE CVE-2016-0778 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3" CPE="cpe:/o:suse:suse_sled:11:sp3">SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3" CPE="cpe:/o:suse:suse_sles:11:sp3">SUSE Linux Enterprise Server 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3" CPE="cpe:/o:suse:sles_sap:11:sp3">SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openssh-6.2p2-0.24.1">
      <FullProductName ProductID="openssh-6.2p2-0.24.1">openssh-6.2p2-0.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-askpass-6.2p2-0.24.1">
      <FullProductName ProductID="openssh-askpass-6.2p2-0.24.1">openssh-askpass-6.2p2-0.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-askpass-gnome-6.2p2-0.24.3">
      <FullProductName ProductID="openssh-askpass-gnome-6.2p2-0.24.3">openssh-askpass-gnome-6.2p2-0.24.3</FullProductName>
    </Branch>
    <Relationship ProductReference="openssh-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.24.1">openssh-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.24.1">openssh-askpass-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-gnome-6.2p2-0.24.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3">openssh-askpass-gnome-6.2p2-0.24.3 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.24.1">openssh-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.24.1">openssh-askpass-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-gnome-6.2p2-0.24.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3">openssh-askpass-gnome-6.2p2-0.24.3 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.24.1">openssh-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.24.1">openssh-askpass-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-gnome-6.2p2-0.24.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.24.3">openssh-askpass-gnome-6.2p2-0.24.3 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.24.1">openssh-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-6.2p2-0.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.24.1">openssh-askpass-6.2p2-0.24.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-askpass-gnome-6.2p2-0.24.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3">openssh-askpass-gnome-6.2p2-0.24.3 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.</Note>
    </Notes>
    <CVE>CVE-2016-0777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160119-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0777.html</URL>
        <Description>CVE-2016-0777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961642</URL>
        <Description>SUSE Bug 961642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996040</URL>
        <Description>SUSE Bug 996040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.</Note>
    </Notes>
    <CVE>CVE-2016-0778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-6.2p2-0.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssh-askpass-gnome-6.2p2-0.24.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160119-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0778.html</URL>
        <Description>CVE-2016-0778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961645</URL>
        <Description>SUSE Bug 961645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/996040</URL>
        <Description>SUSE Bug 996040</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
