Bugzilla – Bug 943010
VUL-0: CVE-2015-6563: The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platformsaccepts extraneous user...
Last modified: 2019-01-18 14:33:25 UTC
CVE-2015-6563 The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6563 http://www.openwall.com/lists/oss-security/2015/08/22/1 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563 http://www.cvedetails.com/cve/CVE-2015-6563/ http://www.openssh.com/txt/release-7.0 http://seclists.org/fulldisclosure/2015/Aug/54 https://github.com/openssh/openssh-portable/commit/d4697fe9a28dab7255c60433e4dd23cf7fce8a8b
bugbot adjusting priority
This patch would fit easily into 11-SP1, 11-SP3 and 12 openssh . please apply.
QA: no reproducer :(
SUSE-SU-2015:1544-1: An update that solves 5 vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 903649,932483,936695,938746,943006,943010 CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564 Sources used: SUSE Linux Enterprise Server 12 (src): openssh-6.6p1-29.1, openssh-askpass-gnome-6.6p1-29.1 SUSE Linux Enterprise Desktop 12 (src): openssh-6.6p1-29.1, openssh-askpass-gnome-6.6p1-29.1
SUSE-SU-2015:1547-1: An update that solves 5 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010 CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564 Sources used: SUSE Linux Enterprise Server for VMWare 11-SP3 (src): openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3 SUSE Linux Enterprise Server 11-SP3 (src): openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
SUSE-SU-2015:1547-2: An update that solves 5 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010 CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564 Sources used: SUSE Linux Enterprise Desktop 11-SP3 (src): openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3 SUSE Linux Enterprise Debuginfo 11-SP3 (src): openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
SUSE-SU-2015:1581-1: An update that solves 5 vulnerabilities and has 6 fixes is now available. Category: security (important) Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010,945493 CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564 Sources used: SUSE Linux Enterprise Server for VMWare 11-SP3 (src): openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3 SUSE Linux Enterprise Server 11-SP3 (src): openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3 SUSE Linux Enterprise Desktop 11-SP3 (src): openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3 SUSE Linux Enterprise Debuginfo 11-SP3 (src): openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
SUSE-SU-2015:1695-1: An update that solves 5 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 903649,932483,936695,938746,939932,943006,943010,945484,945493,947458 CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3 SUSE Linux Enterprise Desktop 11-SP4 (src): openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3 SUSE Linux Enterprise Debuginfo 11-SP4 (src): openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2017-01-18. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63340