Bug 943006 (CVE-2015-6564) - VUL-0: CVE-2015-6564: openssh: Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.cin sshd in OpenSSH ...
Summary: VUL-0: CVE-2015-6564: openssh: Use-after-free vulnerability in the mm_answer_...
Status: RESOLVED FIXED
: 959715 (view as bug list)
Alias: CVE-2015-6564
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2017-01-18
Assignee: Petr Cerny
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/137386/
Whiteboard: maint:running:62212:moderate maint:re...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-08-25 07:48 UTC by Sebastian Krahmer
Modified: 2019-05-01 16:50 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2015-08-25 07:48:51 UTC
CVE-2015-6564

Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c
in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users
to gain privileges by leveraging control of the sshd uid to send an unexpectedly
early MONITOR_REQ_PAM_FREE_CTX request.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6564
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564
http://www.cvedetails.com/cve/CVE-2015-6564/
https://github.com/openssh/openssh-portable/commit/5e75f5198769056089fb06c4d738ab0e5abc66f7
Comment 1 Swamp Workflow Management 2015-08-25 22:00:17 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2015-09-07 15:00:44 UTC
seems also to apply to 5.1p1 and 6.1p1 we have in 11-sp1, 11-sp3 and 12-ga.

please apply.
Comment 3 Marcus Meissner 2015-09-10 10:20:51 UTC
QA: no reproducer
Comment 4 Swamp Workflow Management 2015-09-11 13:10:46 UTC
SUSE-SU-2015:1544-1: An update that solves 5 vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 903649,932483,936695,938746,943006,943010
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server 12 (src):    openssh-6.6p1-29.1, openssh-askpass-gnome-6.6p1-29.1
SUSE Linux Enterprise Desktop 12 (src):    openssh-6.6p1-29.1, openssh-askpass-gnome-6.6p1-29.1
Comment 5 Swamp Workflow Management 2015-09-11 15:12:51 UTC
SUSE-SU-2015:1547-1: An update that solves 5 vulnerabilities and has 5 fixes is now available.

Category: security (moderate)
Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
SUSE Linux Enterprise Server 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
Comment 6 Swamp Workflow Management 2015-09-11 16:13:04 UTC
SUSE-SU-2015:1547-2: An update that solves 5 vulnerabilities and has 5 fixes is now available.

Category: security (moderate)
Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Desktop 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
Comment 7 Swamp Workflow Management 2015-09-21 07:13:13 UTC
SUSE-SU-2015:1581-1: An update that solves 5 vulnerabilities and has 6 fixes is now available.

Category: security (important)
Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010,945493
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
SUSE Linux Enterprise Server 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
SUSE Linux Enterprise Desktop 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
Comment 9 Swamp Workflow Management 2015-10-07 16:12:26 UTC
SUSE-SU-2015:1695-1: An update that solves 5 vulnerabilities and has 5 fixes is now available.

Category: security (moderate)
Bug References: 903649,932483,936695,938746,939932,943006,943010,945484,945493,947458
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server 11-SP4 (src):    openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3
SUSE Linux Enterprise Desktop 11-SP4 (src):    openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3
Comment 11 Marcus Meissner 2015-11-10 14:02:04 UTC
also tracked as OSVDB 126033
Comment 12 Josef Cejka 2016-01-04 08:41:02 UTC
*** Bug 959715 has been marked as a duplicate of this bug. ***
Comment 14 Swamp Workflow Management 2017-01-11 10:24:47 UTC
An update workflow for this issue was started.
This issue was rated as important.
Please submit fixed packages until 2017-01-18.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/63340
Comment 15 mike zhu 2018-09-13 11:00:37 UTC
Regarding:
CVE-2015-5600
CVE-2015-6563
CVE-2015-6564

We are using the security modules now and what to know
If these 3 CVEs effected openssh-openss1?
If yes, Does openssh-openssl1 addressed these 3 CVEs and in which version it is addressed?
I can't get any information about openssh-openssl on these CVEs's pages.
(like https://www.suse.com/security/cve/CVE-2015-6563/)
Comment 16 Marcus Meissner 2018-09-13 12:19:23 UTC
These 3 CVES are fixed in openssh-openssl1, and were in its first introduction.