Описание
Security update for openssh
This update for openssh fixes the following issues:
- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).
- Supplement libgtk-3-0 instead of libX11-6 to avoid installation on a textmode install (bsc#1142000)
- Fixed an issue where oracle cluster with cluvfy using 'scp' failing/missinterpreted (bsc#1148566).
- Fixed sshd termination of multichannel sessions with non-root users (bsc#1115550,bsc#1174162).
- Added speculative hardening for key storage (bsc#1139398).
Список пакетов
Image SLES15-SP1-Azure-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-Azure-HPC-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-CHOST-BYOS-Azure
openssh-7.9p1-6.22.1
Image SLES15-SP1-CHOST-BYOS-EC2
openssh-7.9p1-6.22.1
Image SLES15-SP1-CHOST-BYOS-GCE
openssh-7.9p1-6.22.1
Image SLES15-SP1-EC2-HPC-HVM-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-EC2-HVM-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-GCE-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy
openssh-7.9p1-6.22.1
Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server
openssh-7.9p1-6.22.1
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy
openssh-7.9p1-6.22.1
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server
openssh-7.9p1-6.22.1
Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy
openssh-7.9p1-6.22.1
Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server
openssh-7.9p1-6.22.1
Image SLES15-SP1-OCI-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-Azure
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-Azure-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-EC2-HVM
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-EC2-HVM-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-GCE
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-GCE-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAP-OCI-BYOS
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAPCAL-Azure
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAPCAL-EC2-HVM
openssh-7.9p1-6.22.1
Image SLES15-SP1-SAPCAL-GCE
openssh-7.9p1-6.22.1
SUSE Linux Enterprise Module for Basesystem 15 SP1
openssh-7.9p1-6.22.1
openssh-helpers-7.9p1-6.22.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP1
openssh-askpass-gnome-7.9p1-6.22.1
SUSE Linux Enterprise Module for Server Applications 15 SP1
openssh-fips-7.9p1-6.22.1
Ссылки
- Link for SUSE-SU-2020:3866-1
- E-Mail link for SUSE-SU-2020:3866-1
- SUSE Security Ratings
- SUSE Bug 1115550
- SUSE Bug 1139398
- SUSE Bug 1142000
- SUSE Bug 1148566
- SUSE Bug 1173513
- SUSE Bug 1174162
- SUSE CVE CVE-2020-14145 page
Описание
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
Затронутые продукты
Image SLES15-SP1-Azure-BYOS:openssh-7.9p1-6.22.1
Image SLES15-SP1-Azure-HPC-BYOS:openssh-7.9p1-6.22.1
Image SLES15-SP1-CHOST-BYOS-Azure:openssh-7.9p1-6.22.1
Image SLES15-SP1-CHOST-BYOS-EC2:openssh-7.9p1-6.22.1
Ссылки
- CVE-2020-14145
- SUSE Bug 1173513
- SUSE Bug 1177569
- SUSE Bug 1189078