ALT-BU-2016-2541-1
Branch t7 update bulletin.
Closed vulnerabilities
BDU:2014-00019
Уязвимость программного обеспечения управления виртуальной инфраструктурой VMware vCenter Server, позволяющая злоумышленнику препятствовать входу других пользователей в систему
BDU:2015-04127
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06145
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06146
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06147
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06148
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06149
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06150
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-06151
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-09678
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01913
Уязвимость функции resend_bytes средства криптографической защиты OpenSSH, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01914
Уязвимость функций roaming_read и roaming_write средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2010-5107
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
- HPSBMU03409
- RHSA-2013:1591
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89
- [oss-security] 20130206 Re: CVE id request: openssh?
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 58162
- https://bugzilla.redhat.com/show_bug.cgi?id=908707
- oval:org.mitre.oval:def:19515
- oval:org.mitre.oval:def:19595
- HPSBMU03409
- oval:org.mitre.oval:def:19595
- oval:org.mitre.oval:def:19515
- https://bugzilla.redhat.com/show_bug.cgi?id=908707
- 58162
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- [oss-security] 20130206 Re: CVE id request: openssh?
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234
- RHSA-2013:1591
Modified: 2024-11-21
CVE-2014-1692
The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
- HPSBUX03188
- HPSBUX03188
- SSRT101487
- SSRT101487
- HPSBMU03409
- HPSBMU03409
- [oss-security] 20140129 Re: OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- [oss-security] 20140129 Re: OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- [oss-security] 20140128 OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- [oss-security] 20140128 OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
- 102611
- 102611
- 60184
- 60184
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/schnorr.c#rev1.10
- 65230
- 65230
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1020637
- openssh-cve20141692-code-exec(90819)
- openssh-cve20141692-code-exec(90819)
Modified: 2024-11-21
CVE-2014-2532
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
- http://advisories.mageia.org/MGASA-2014-0143.html
- http://advisories.mageia.org/MGASA-2014-0143.html
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- FEDORA-2014-6569
- FEDORA-2014-6569
- FEDORA-2014-6380
- FEDORA-2014-6380
- HPSBUX03188
- HPSBUX03188
- SSRT101487
- SSRT101487
- [security-announce] 20140315 Announce: OpenSSH 6.6 released
- [security-announce] 20140315 Announce: OpenSSH 6.6 released
- RHSA-2014:1552
- RHSA-2014:1552
- 57488
- 57488
- 57574
- 57574
- 59313
- 59313
- 59855
- 59855
- DSA-2894
- DSA-2894
- MDVSA-2014:068
- MDVSA-2014:068
- MDVSA-2015:095
- MDVSA-2015:095
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- 66355
- 66355
- 1029925
- 1029925
- USN-2155-1
- USN-2155-1
- openssh-cve20142532-sec-bypass(91986)
- openssh-cve20142532-sec-bypass(91986)
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
Modified: 2024-11-21
CVE-2014-2653
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
- http://advisories.mageia.org/MGASA-2014-0166.html
- http://advisories.mageia.org/MGASA-2014-0166.html
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- FEDORA-2014-6569
- FEDORA-2014-6569
- FEDORA-2014-6380
- FEDORA-2014-6380
- HPSBUX03188
- HPSBUX03188
- SSRT101487
- SSRT101487
- [oss-security] 20140326 CVE request: openssh client does not check SSHFP if server offers certificate
- [oss-security] 20140326 CVE request: openssh client does not check SSHFP if server offers certificate
- RHSA-2014:1552
- RHSA-2014:1552
- RHSA-2015:0425
- RHSA-2015:0425
- 59855
- 59855
- DSA-2894
- DSA-2894
- MDVSA-2014:068
- MDVSA-2014:068
- MDVSA-2015:095
- MDVSA-2015:095
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 66459
- 66459
- USN-2164-1
- USN-2164-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513
Modified: 2024-11-21
CVE-2016-0777
The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-67c6ef0d4f
- FEDORA-2016-67c6ef0d4f
- FEDORA-2016-c330264861
- FEDORA-2016-c330264861
- FEDORA-2016-4556904561
- FEDORA-2016-4556904561
- SUSE-SU-2016:0117
- SUSE-SU-2016:0117
- SUSE-SU-2016:0118
- SUSE-SU-2016:0118
- SUSE-SU-2016:0119
- SUSE-SU-2016:0119
- SUSE-SU-2016:0120
- SUSE-SU-2016:0120
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0128
- openSUSE-SU-2016:0128
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- DSA-3446
- DSA-3446
- http://www.openssh.com/txt/release-7.1p2
- http://www.openssh.com/txt/release-7.1p2
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 80695
- 80695
- 1034671
- 1034671
- USN-2869-1
- USN-2869-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://bto.bluecoat.com/security-advisory/sa109
- https://bto.bluecoat.com/security-advisory/sa109
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- FreeBSD-SA-16:07
- FreeBSD-SA-16:07
- GLSA-201601-01
- GLSA-201601-01
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Modified: 2024-11-21
CVE-2016-0778
The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-2e89eba0c1
- FEDORA-2016-4556904561
- FEDORA-2016-4556904561
- SUSE-SU-2016:0117
- SUSE-SU-2016:0117
- SUSE-SU-2016:0118
- SUSE-SU-2016:0118
- SUSE-SU-2016:0119
- SUSE-SU-2016:0119
- SUSE-SU-2016:0120
- SUSE-SU-2016:0120
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0127
- openSUSE-SU-2016:0128
- openSUSE-SU-2016:0128
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- http://packetstormsecurity.com/files/135273/Qualys-Security-Advisory-OpenSSH-Overflow-Leak.html
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160115 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- DSA-3446
- DSA-3446
- http://www.openssh.com/txt/release-7.1p2
- http://www.openssh.com/txt/release-7.1p2
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- [oss-security] 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 20160114 Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778
- 80698
- 80698
- 1034671
- 1034671
- USN-2869-1
- USN-2869-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://bto.bluecoat.com/security-advisory/sa109
- https://bto.bluecoat.com/security-advisory/sa109
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- GLSA-201601-01
- GLSA-201601-01
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Closed bugs
ssh-agent удаляет сокет при отсутствующем ssh-askpass
Package postgresql9.4 updated to version 9.4.5-alt0.M70P.2 for branch t7 in task 155954.
Closed bugs
Ошибка установки пакета postgresql9.4-1C-server из-за конфликта пакетов libpq5.7-1C и libpq5.7