Описание
Security update for openssh
This update for openssh fixes the following issues:
Following security issues have been fixed:
- CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration (or 'oracle') as a vulnerability. (bsc#1106163)
- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)
Also the following security related hardening change was done:
- Remove arcfour,cast,blowfish from list of default ciphers. (bsc#982273)
And the following non-security issues were fixed:
- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure (bsc#1091396)
Список пакетов
SUSE Linux Enterprise Server for SAP Applications 12 SP1
openssh-6.6p1-54.18.1
openssh-askpass-gnome-6.6p1-54.18.1
openssh-fips-6.6p1-54.18.1
openssh-helpers-6.6p1-54.18.1
Ссылки
- Link for SUSE-SU-2018:3776-2
- E-Mail link for SUSE-SU-2018:3776-2
- SUSE Security Ratings
- SUSE Bug 1091396
- SUSE Bug 1105010
- SUSE Bug 1106163
- SUSE Bug 964336
- SUSE Bug 982273
- SUSE CVE CVE-2018-15473 page
Описание
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Затронутые продукты
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-6.6p1-54.18.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-askpass-gnome-6.6p1-54.18.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-fips-6.6p1-54.18.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssh-helpers-6.6p1-54.18.1
Ссылки
- CVE-2018-15473
- SUSE Bug 1105010
- SUSE Bug 1106163
- SUSE Bug 1123133
- SUSE Bug 1138392
- SUSE Bug 1205621