{"affected":[{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-36.3.1","openssh-askpass-gnome":"6.6p1-36.3.1","openssh-fips":"6.6p1-36.3.1","openssh-helpers":"6.6p1-36.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"openssh","purl":"pkg:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-36.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-36.3.1","openssh-askpass-gnome":"6.6p1-36.3.1","openssh-fips":"6.6p1-36.3.1","openssh-helpers":"6.6p1-36.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"openssh-askpass-gnome","purl":"pkg:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-36.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-36.3.1","openssh-askpass-gnome":"6.6p1-36.3.1","openssh-fips":"6.6p1-36.3.1","openssh-helpers":"6.6p1-36.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"openssh","purl":"pkg:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-36.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"openssh":"6.6p1-36.3.1","openssh-askpass-gnome":"6.6p1-36.3.1","openssh-fips":"6.6p1-36.3.1","openssh-helpers":"6.6p1-36.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"openssh-askpass-gnome","purl":"pkg:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.6p1-36.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openssh fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-10012: Fix pre-auth compression checks that could be optimized away (bsc#1016370).\n- CVE-2016-10708: Fix remote denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYSmessage (bsc#1076957).\n- CVE-2017-15906: Fix r/o sftp-server zero byte file creation (bsc#1065000).\n- CVE-2008-1483: Fix accidental re-introduction of CVE-2008-1483 (bsc#1069509).\n\nBug fixes:\n\n- bsc#1017099: Match conditions with uppercase hostnames fail (bsc#1017099)\n- bsc#1053972: supportedKeyExchanges diffie-hellman-group1-sha1 is duplicated (bsc#1053972)\n- bsc#1023275: Messages suppressed after upgrade from SLES 11 SP3 to SP4 (bsc#1023275)\n","id":"SUSE-SU-2018:2275-1","modified":"2018-08-09T13:56:33Z","published":"2018-08-09T13:56:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182275-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017099"},{"type":"REPORT","url":"https://bugzilla.suse.com/1023275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1053972"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1069509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1076957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2008-1483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10708"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-15906"}],"related":["CVE-2008-1483","CVE-2016-10012","CVE-2016-10708","CVE-2017-15906"],"summary":"Security update for openssh","upstream":["CVE-2008-1483","CVE-2016-10012","CVE-2016-10708","CVE-2017-15906"]}