Bugzilla – Bug 869101
VUL-1: CVE-2014-2532: openssh: AcceptEnv environment restriction bypass flaw
Last modified: 2022-02-13 11:07:16 UTC
via cve db in openssh 6.6: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532 sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character. http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
Affected packages: SLE-11-SP3: openssh SLE-10-SP3-TERADATA: openssh SLE-11-SP2: openssh
planned for now.
bugbot adjusting priority
Update released for: openssh, openssh-askpass, openssh-askpass-gnome, openssh-askpass-gnome-debuginfo, openssh-debuginfo Products: SLE-DEBUGINFO 10-SP3-TERADATA (x86_64) SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: openssh, openssh-askpass, openssh-askpass-gnome, openssh-askpass-gnome-debuginfo, openssh-debuginfo, openssh-debugsource Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
SUSE-SU-2014:0818-1: An update that solves one vulnerability and has four fixes is now available. Category: security (low) Bug References: 826427,833605,847710,869101,870532 CVE References: CVE-2014-2532 Sources used: SUSE Linux Enterprise Server 11 SP3 for VMware (src): openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1 SUSE Linux Enterprise Server 11 SP3 (src): openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1 SUSE Linux Enterprise Desktop 11 SP3 (src): openssh-6.2p2-0.13.1, openssh-askpass-gnome-6.2p2-0.13.1
regular updates released. no ltss updates so far, will be rolled in later.
*** Bug 890850 has been marked as a duplicate of this bug. ***
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2017-01-18. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63340