{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for openssh","title":"Title of the patch"},{"category":"description","text":"\nopenssh was updated to fix several security issues.\n\nThese security issues were fixed:\n* CVE-2015-5352: The x11_open_helper function in channels.c in ssh\n  in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of\n  the refusal deadline for X connections, which made it easier for remote\n  attackers to bypass intended access restrictions via a connection outside\n  of the permitted time window (bsc#936695).\n* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c\n  in sshd in OpenSSH did not properly restrict the processing of\n  keyboard-interactive devices within a single connection, which made it\n  easier for remote attackers to conduct brute-force attacks or cause a\n  denial of service (CPU consumption) via a long and duplicative list in\n  the ssh -oKbdInteractiveDevices option, as demonstrated by a modified\n  client that provides a different password for each pam element on this\n  list (bsc#938746).\n* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).\n* Hardening patch to fix sftp RCE (bsc#903649).\n* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted\n  extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which\n  allowed local users to conduct impersonation attacks by leveraging any SSH\n  login access in conjunction with control of the sshd uid to send a crafted\n  MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. (bsc#943010)\n* CVE-2015-6564: Use-after-free vulnerability in the\n  mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might\n  have allowed local users to gain privileges by leveraging control of the\n  sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. (bsc#943006)\n\nAlso use %restart_on_update in the trigger script.\n","title":"Description of the patch"},{"category":"details","text":"SUSE-SLE-DESKTOP-12-2015-526,SUSE-SLE-SERVER-12-2015-526","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1544-1.json"},{"category":"self","summary":"URL for SUSE-SU-2015:1544-1","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20151544-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2015:1544-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html"},{"category":"self","summary":"SUSE Bug 903649","url":"https://bugzilla.suse.com/903649"},{"category":"self","summary":"SUSE Bug 932483","url":"https://bugzilla.suse.com/932483"},{"category":"self","summary":"SUSE Bug 936695","url":"https://bugzilla.suse.com/936695"},{"category":"self","summary":"SUSE Bug 938746","url":"https://bugzilla.suse.com/938746"},{"category":"self","summary":"SUSE Bug 943006","url":"https://bugzilla.suse.com/943006"},{"category":"self","summary":"SUSE Bug 943010","url":"https://bugzilla.suse.com/943010"},{"category":"self","summary":"SUSE CVE CVE-2015-4000 page","url":"https://www.suse.com/security/cve/CVE-2015-4000/"},{"category":"self","summary":"SUSE CVE CVE-2015-5352 page","url":"https://www.suse.com/security/cve/CVE-2015-5352/"},{"category":"self","summary":"SUSE CVE CVE-2015-5600 page","url":"https://www.suse.com/security/cve/CVE-2015-5600/"},{"category":"self","summary":"SUSE CVE CVE-2015-6563 page","url":"https://www.suse.com/security/cve/CVE-2015-6563/"},{"category":"self","summary":"SUSE CVE CVE-2015-6564 page","url":"https://www.suse.com/security/cve/CVE-2015-6564/"}],"title":"Security update for openssh","tracking":{"current_release_date":"2015-09-09T08:52:05Z","generator":{"date":"2015-09-09T08:52:05Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2015:1544-1","initial_release_date":"2015-09-09T08:52:05Z","revision_history":[{"date":"2015-09-09T08:52:05Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"openssh-6.6p1-29.1.ppc64le","product":{"name":"openssh-6.6p1-29.1.ppc64le","product_id":"openssh-6.6p1-29.1.ppc64le"}},{"category":"product_version","name":"openssh-askpass-gnome-6.6p1-29.1.ppc64le","product":{"name":"openssh-askpass-gnome-6.6p1-29.1.ppc64le","product_id":"openssh-askpass-gnome-6.6p1-29.1.ppc64le"}},{"category":"product_version","name":"openssh-fips-6.6p1-29.1.ppc64le","product":{"name":"openssh-fips-6.6p1-29.1.ppc64le","product_id":"openssh-fips-6.6p1-29.1.ppc64le"}},{"category":"product_version","name":"openssh-helpers-6.6p1-29.1.ppc64le","product":{"name":"openssh-helpers-6.6p1-29.1.ppc64le","product_id":"openssh-helpers-6.6p1-29.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"openssh-6.6p1-29.1.s390x","product":{"name":"openssh-6.6p1-29.1.s390x","product_id":"openssh-6.6p1-29.1.s390x"}},{"category":"product_version","name":"openssh-askpass-gnome-6.6p1-29.1.s390x","product":{"name":"openssh-askpass-gnome-6.6p1-29.1.s390x","product_id":"openssh-askpass-gnome-6.6p1-29.1.s390x"}},{"category":"product_version","name":"openssh-fips-6.6p1-29.1.s390x","product":{"name":"openssh-fips-6.6p1-29.1.s390x","product_id":"openssh-fips-6.6p1-29.1.s390x"}},{"category":"product_version","name":"openssh-helpers-6.6p1-29.1.s390x","product":{"name":"openssh-helpers-6.6p1-29.1.s390x","product_id":"openssh-helpers-6.6p1-29.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"openssh-6.6p1-29.1.x86_64","product":{"name":"openssh-6.6p1-29.1.x86_64","product_id":"openssh-6.6p1-29.1.x86_64"}},{"category":"product_version","name":"openssh-askpass-gnome-6.6p1-29.1.x86_64","product":{"name":"openssh-askpass-gnome-6.6p1-29.1.x86_64","product_id":"openssh-askpass-gnome-6.6p1-29.1.x86_64"}},{"category":"product_version","name":"openssh-helpers-6.6p1-29.1.x86_64","product":{"name":"openssh-helpers-6.6p1-29.1.x86_64","product_id":"openssh-helpers-6.6p1-29.1.x86_64"}},{"category":"product_version","name":"openssh-fips-6.6p1-29.1.x86_64","product":{"name":"openssh-fips-6.6p1-29.1.x86_64","product_id":"openssh-fips-6.6p1-29.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Desktop 12","product":{"name":"SUSE Linux Enterprise Desktop 12","product_id":"SUSE Linux Enterprise Desktop 12","product_identification_helper":{"cpe":"cpe:/o:suse:sled:12"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 12","product":{"name":"SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12","product_identification_helper":{"cpe":"cpe:/o:suse:sles:12"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 12","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:12"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"openssh-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12","product_id":"SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64"},"product_reference":"openssh-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Desktop 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-askpass-gnome-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12","product_id":"SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64"},"product_reference":"openssh-askpass-gnome-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Desktop 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-helpers-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12","product_id":"SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64"},"product_reference":"openssh-helpers-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Desktop 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le"},"product_reference":"openssh-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x"},"product_reference":"openssh-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64"},"product_reference":"openssh-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-askpass-gnome-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le"},"product_reference":"openssh-askpass-gnome-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-askpass-gnome-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x"},"product_reference":"openssh-askpass-gnome-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-askpass-gnome-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64"},"product_reference":"openssh-askpass-gnome-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-fips-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le"},"product_reference":"openssh-fips-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-fips-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x"},"product_reference":"openssh-fips-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-fips-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64"},"product_reference":"openssh-fips-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-helpers-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le"},"product_reference":"openssh-helpers-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-helpers-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x"},"product_reference":"openssh-helpers-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-helpers-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server 12","product_id":"SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64"},"product_reference":"openssh-helpers-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le"},"product_reference":"openssh-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x"},"product_reference":"openssh-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64"},"product_reference":"openssh-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-askpass-gnome-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le"},"product_reference":"openssh-askpass-gnome-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-askpass-gnome-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x"},"product_reference":"openssh-askpass-gnome-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-askpass-gnome-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64"},"product_reference":"openssh-askpass-gnome-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-fips-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le"},"product_reference":"openssh-fips-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-fips-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x"},"product_reference":"openssh-fips-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-fips-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64"},"product_reference":"openssh-fips-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-helpers-6.6p1-29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le"},"product_reference":"openssh-helpers-6.6p1-29.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-helpers-6.6p1-29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x"},"product_reference":"openssh-helpers-6.6p1-29.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"},{"category":"default_component_of","full_product_name":{"name":"openssh-helpers-6.6p1-29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12","product_id":"SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"},"product_reference":"openssh-helpers-6.6p1-29.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12"}]},"vulnerabilities":[{"cve":"CVE-2015-4000","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-4000"}],"notes":[{"category":"general","text":"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-4000","url":"https://www.suse.com/security/cve/CVE-2015-4000"},{"category":"external","summary":"SUSE Bug 1074631 for CVE-2015-4000","url":"https://bugzilla.suse.com/1074631"},{"category":"external","summary":"SUSE Bug 1211968 for CVE-2015-4000","url":"https://bugzilla.suse.com/1211968"},{"category":"external","summary":"SUSE Bug 931600 for CVE-2015-4000","url":"https://bugzilla.suse.com/931600"},{"category":"external","summary":"SUSE Bug 931698 for CVE-2015-4000","url":"https://bugzilla.suse.com/931698"},{"category":"external","summary":"SUSE Bug 931723 for CVE-2015-4000","url":"https://bugzilla.suse.com/931723"},{"category":"external","summary":"SUSE Bug 931845 for CVE-2015-4000","url":"https://bugzilla.suse.com/931845"},{"category":"external","summary":"SUSE Bug 932026 for CVE-2015-4000","url":"https://bugzilla.suse.com/932026"},{"category":"external","summary":"SUSE Bug 932483 for CVE-2015-4000","url":"https://bugzilla.suse.com/932483"},{"category":"external","summary":"SUSE Bug 934789 for CVE-2015-4000","url":"https://bugzilla.suse.com/934789"},{"category":"external","summary":"SUSE Bug 935033 for CVE-2015-4000","url":"https://bugzilla.suse.com/935033"},{"category":"external","summary":"SUSE Bug 935540 for CVE-2015-4000","url":"https://bugzilla.suse.com/935540"},{"category":"external","summary":"SUSE Bug 935979 for CVE-2015-4000","url":"https://bugzilla.suse.com/935979"},{"category":"external","summary":"SUSE Bug 937202 for CVE-2015-4000","url":"https://bugzilla.suse.com/937202"},{"category":"external","summary":"SUSE Bug 937766 for CVE-2015-4000","url":"https://bugzilla.suse.com/937766"},{"category":"external","summary":"SUSE Bug 938248 for CVE-2015-4000","url":"https://bugzilla.suse.com/938248"},{"category":"external","summary":"SUSE Bug 938432 for CVE-2015-4000","url":"https://bugzilla.suse.com/938432"},{"category":"external","summary":"SUSE Bug 938895 for CVE-2015-4000","url":"https://bugzilla.suse.com/938895"},{"category":"external","summary":"SUSE Bug 938905 for CVE-2015-4000","url":"https://bugzilla.suse.com/938905"},{"category":"external","summary":"SUSE Bug 938906 for CVE-2015-4000","url":"https://bugzilla.suse.com/938906"},{"category":"external","summary":"SUSE Bug 938913 for CVE-2015-4000","url":"https://bugzilla.suse.com/938913"},{"category":"external","summary":"SUSE Bug 938945 for CVE-2015-4000","url":"https://bugzilla.suse.com/938945"},{"category":"external","summary":"SUSE Bug 943664 for CVE-2015-4000","url":"https://bugzilla.suse.com/943664"},{"category":"external","summary":"SUSE Bug 944729 for CVE-2015-4000","url":"https://bugzilla.suse.com/944729"},{"category":"external","summary":"SUSE Bug 945582 for CVE-2015-4000","url":"https://bugzilla.suse.com/945582"},{"category":"external","summary":"SUSE Bug 955589 for CVE-2015-4000","url":"https://bugzilla.suse.com/955589"},{"category":"external","summary":"SUSE Bug 980406 for CVE-2015-4000","url":"https://bugzilla.suse.com/980406"},{"category":"external","summary":"SUSE Bug 990592 for CVE-2015-4000","url":"https://bugzilla.suse.com/990592"},{"category":"external","summary":"SUSE Bug 994144 for CVE-2015-4000","url":"https://bugzilla.suse.com/994144"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.7,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-09-09T08:52:05Z","details":"important"}],"title":"CVE-2015-4000"},{"cve":"CVE-2015-5352","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-5352"}],"notes":[{"category":"general","text":"The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-5352","url":"https://www.suse.com/security/cve/CVE-2015-5352"},{"category":"external","summary":"SUSE Bug 1074631 for CVE-2015-5352","url":"https://bugzilla.suse.com/1074631"},{"category":"external","summary":"SUSE Bug 1138392 for CVE-2015-5352","url":"https://bugzilla.suse.com/1138392"},{"category":"external","summary":"SUSE Bug 936695 for CVE-2015-5352","url":"https://bugzilla.suse.com/936695"},{"category":"external","summary":"SUSE Bug 938277 for CVE-2015-5352","url":"https://bugzilla.suse.com/938277"},{"category":"external","summary":"SUSE Bug 948086 for CVE-2015-5352","url":"https://bugzilla.suse.com/948086"},{"category":"external","summary":"SUSE Bug 992991 for CVE-2015-5352","url":"https://bugzilla.suse.com/992991"},{"category":"external","summary":"SUSE Bug 996040 for CVE-2015-5352","url":"https://bugzilla.suse.com/996040"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-09-09T08:52:05Z","details":"moderate"}],"title":"CVE-2015-5352"},{"cve":"CVE-2015-5600","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-5600"}],"notes":[{"category":"general","text":"The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-5600","url":"https://www.suse.com/security/cve/CVE-2015-5600"},{"category":"external","summary":"SUSE Bug 1009988 for CVE-2015-5600","url":"https://bugzilla.suse.com/1009988"},{"category":"external","summary":"SUSE Bug 1074631 for CVE-2015-5600","url":"https://bugzilla.suse.com/1074631"},{"category":"external","summary":"SUSE Bug 1138392 for CVE-2015-5600","url":"https://bugzilla.suse.com/1138392"},{"category":"external","summary":"SUSE Bug 938746 for CVE-2015-5600","url":"https://bugzilla.suse.com/938746"},{"category":"external","summary":"SUSE Bug 943006 for CVE-2015-5600","url":"https://bugzilla.suse.com/943006"},{"category":"external","summary":"SUSE Bug 943007 for CVE-2015-5600","url":"https://bugzilla.suse.com/943007"},{"category":"external","summary":"SUSE Bug 943010 for CVE-2015-5600","url":"https://bugzilla.suse.com/943010"},{"category":"external","summary":"SUSE Bug 943504 for CVE-2015-5600","url":"https://bugzilla.suse.com/943504"},{"category":"external","summary":"SUSE Bug 945985 for CVE-2015-5600","url":"https://bugzilla.suse.com/945985"},{"category":"external","summary":"SUSE Bug 948086 for CVE-2015-5600","url":"https://bugzilla.suse.com/948086"},{"category":"external","summary":"SUSE Bug 954457 for CVE-2015-5600","url":"https://bugzilla.suse.com/954457"},{"category":"external","summary":"SUSE Bug 957883 for CVE-2015-5600","url":"https://bugzilla.suse.com/957883"},{"category":"external","summary":"SUSE Bug 996040 for CVE-2015-5600","url":"https://bugzilla.suse.com/996040"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-09-09T08:52:05Z","details":"important"}],"title":"CVE-2015-5600"},{"cve":"CVE-2015-6563","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-6563"}],"notes":[{"category":"general","text":"The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-6563","url":"https://www.suse.com/security/cve/CVE-2015-6563"},{"category":"external","summary":"SUSE Bug 1074631 for CVE-2015-6563","url":"https://bugzilla.suse.com/1074631"},{"category":"external","summary":"SUSE Bug 943006 for CVE-2015-6563","url":"https://bugzilla.suse.com/943006"},{"category":"external","summary":"SUSE Bug 943007 for CVE-2015-6563","url":"https://bugzilla.suse.com/943007"},{"category":"external","summary":"SUSE Bug 943010 for CVE-2015-6563","url":"https://bugzilla.suse.com/943010"},{"category":"external","summary":"SUSE Bug 948086 for CVE-2015-6563","url":"https://bugzilla.suse.com/948086"},{"category":"external","summary":"SUSE Bug 996040 for CVE-2015-6563","url":"https://bugzilla.suse.com/996040"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-09-09T08:52:05Z","details":"moderate"}],"title":"CVE-2015-6563"},{"cve":"CVE-2015-6564","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-6564"}],"notes":[{"category":"general","text":"Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-6564","url":"https://www.suse.com/security/cve/CVE-2015-6564"},{"category":"external","summary":"SUSE Bug 1074631 for CVE-2015-6564","url":"https://bugzilla.suse.com/1074631"},{"category":"external","summary":"SUSE Bug 1138392 for CVE-2015-6564","url":"https://bugzilla.suse.com/1138392"},{"category":"external","summary":"SUSE Bug 942850 for CVE-2015-6564","url":"https://bugzilla.suse.com/942850"},{"category":"external","summary":"SUSE Bug 943006 for CVE-2015-6564","url":"https://bugzilla.suse.com/943006"},{"category":"external","summary":"SUSE Bug 943007 for CVE-2015-6564","url":"https://bugzilla.suse.com/943007"},{"category":"external","summary":"SUSE Bug 943010 for CVE-2015-6564","url":"https://bugzilla.suse.com/943010"},{"category":"external","summary":"SUSE Bug 948086 for CVE-2015-6564","url":"https://bugzilla.suse.com/948086"},{"category":"external","summary":"SUSE Bug 996040 for CVE-2015-6564","url":"https://bugzilla.suse.com/996040"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Desktop 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server 12:openssh-helpers-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-askpass-gnome-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-fips-6.6p1-29.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12:openssh-helpers-6.6p1-29.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-09-09T08:52:05Z","details":"moderate"}],"title":"CVE-2015-6564"}]}