{"affected":[{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-54.15.2","openssh-askpass-gnome":"6.6p1-54.15.1","openssh-fips":"6.6p1-54.15.2","openssh-helpers":"6.6p1-54.15.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"openssh","purl":"pkg:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-54.15.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-54.15.2","openssh-askpass-gnome":"6.6p1-54.15.1","openssh-fips":"6.6p1-54.15.2","openssh-helpers":"6.6p1-54.15.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"openssh-askpass-gnome","purl":"pkg:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-54.15.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-54.15.2","openssh-askpass-gnome":"6.6p1-54.15.1","openssh-fips":"6.6p1-54.15.2","openssh-helpers":"6.6p1-54.15.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"openssh","purl":"pkg:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-54.15.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-54.15.2","openssh-askpass-gnome":"6.6p1-54.15.1","openssh-fips":"6.6p1-54.15.2","openssh-helpers":"6.6p1-54.15.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"openssh-askpass-gnome","purl":"pkg:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-54.15.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-54.15.2","openssh-askpass-gnome":"6.6p1-54.15.1","openssh-fips":"6.6p1-54.15.2","openssh-helpers":"6.6p1-54.15.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1-LTSS","name":"openssh","purl":"pkg:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-54.15.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-54.15.2","openssh-askpass-gnome":"6.6p1-54.15.1","openssh-fips":"6.6p1-54.15.2","openssh-helpers":"6.6p1-54.15.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1-LTSS","name":"openssh-askpass-gnome","purl":"pkg:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-54.15.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openssh provides the following fixes:\n\nSecurity issues fixed:\n\n- CVE-2017-15906: Stricter checking of operations in read-only mode in sftp server (bsc#1065000).\n- CVE-2016-10012: Remove pre-auth compression support from the server to prevent possible cryptographic attacks (bsc#1016370).\n- CVE-2008-1483: Refine handling of sockets for X11 forwarding to remove reintroduced CVE-2008-1483 (bsc#1069509).\n- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).\n\nBug fixes:\n\n- bsc#1017099: Enable case-insensitive hostname matching.\n- bsc#1023275: Add a new switch for printing diagnostic messages in sftp client's batch mode.\n- bsc#1048367: systemd integration to work around various race conditions.\n- bsc#1053972: Remove duplicate KEX method.\n- bsc#1092582: Add missing piece of systemd integration.\n- Remove the limit on the amount of tasks sshd can run.\n","id":"SUSE-SU-2018:2685-1","modified":"2018-09-11T08:50:47Z","published":"2018-09-11T08:50:47Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182685-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017099"},{"type":"REPORT","url":"https://bugzilla.suse.com/1023275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1048367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1053972"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1069509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1076957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1092582"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2008-1483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10708"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-15906"}],"related":["CVE-2008-1483","CVE-2016-10012","CVE-2016-10708","CVE-2017-15906"],"summary":"Security update for openssh","upstream":["CVE-2008-1483","CVE-2016-10012","CVE-2016-10708","CVE-2017-15906"]}