Bug 1316829 (CVE-2016-3115)
Summary: | CVE-2016-3115 openssh: missing sanitisation of input for X11 forwarding | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | carnil, Cy.Schubert, jjelen, magoldma, mattias.ellert, mgrepl, plautrba, slawomir, szidek, tmraz, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssh 7.2p2 | Doc Type: | Bug Fix |
Doc Text: |
It was discovered that the OpenSSH server did not sanitize data received in requests to enable X11 forwarding. An authenticated client with restricted SSH access could possibly use this flaw to bypass intended restrictions.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-03-21 21:03:14 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1316830, 1317816, 1317817, 1317818, 1317819, 1318201, 1318202 | ||
Bug Blocks: | 1316832 |
Description
Andrej Nemec
2016-03-11 09:11:18 UTC
Created openssh tracking bugs for this issue: Affects: fedora-all [bug 1316830] openssh-7.2p2-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. Statement: (none) Mitigation: Set X11Forwarding=no in sshd_config. For authorized_keys that specify a "command" restriction, this issue can be mitigated by also setting the "no-X11-forwarding" restriction. In OpenSSH 7.2 and later, the "restrict" restriction can be used instead, which includes the "no-X11-forwarding" restriction. Upstream commit: OpenBSD CVS: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c?f=h#rev1.282 Portable OpenSSH git: https://anongit.mindrot.org/openssh.git/commit/?id=4b4bfb01cd40b9ddb948e6026ddd287cc303d871 Created gsi-openssh tracking bugs for this issue: Affects: fedora-all [bug 1318201] Affects: epel-all [bug 1318202] This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0466 https://rhn.redhat.com/errata/RHSA-2016-0466.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0465 https://rhn.redhat.com/errata/RHSA-2016-0465.html openssh-7.2p2-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. openssh-6.9p1-11.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. |