openSUSE Security Update: Security update for openssh ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2339-1 Rating: moderate References: #948902 #981654 #989363 #992533 Cross-References: CVE-2016-6210 CVE-2016-6515 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for openssh fixes the following issues: - Prevent user enumeration through the timing of password processing (bsc#989363, CVE-2016-6210) - Allow lowering the DH groups parameter limit in server as well as when GSSAPI key exchange is used (bsc#948902) - limit accepted password length (prevents possible DoS) (bsc#992533, CVE-2016-6515) Bug fixes: - avoid complaining about unset DISPLAY variable (bsc#981654) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1096=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): openssh-6.6p1-14.1 openssh-askpass-gnome-6.6p1-14.1 openssh-askpass-gnome-debuginfo-6.6p1-14.1 openssh-cavs-6.6p1-14.1 openssh-cavs-debuginfo-6.6p1-14.1 openssh-debuginfo-6.6p1-14.1 openssh-debugsource-6.6p1-14.1 openssh-fips-6.6p1-14.1 openssh-helpers-6.6p1-14.1 openssh-helpers-debuginfo-6.6p1-14.1 References: https://www.suse.com/security/cve/CVE-2016-6210.html https://www.suse.com/security/cve/CVE-2016-6515.html https://bugzilla.suse.com/948902 https://bugzilla.suse.com/981654 https://bugzilla.suse.com/989363 https://bugzilla.suse.com/992533