Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:0022-1

Опубликовано: 05 янв. 2021
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).

Список пакетов

HPE Helion OpenStack 8
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE Enterprise Storage 5
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE Linux Enterprise Server 12 SP2-BCL
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE Linux Enterprise Server 12 SP2-LTSS
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE Linux Enterprise Server 12 SP3-BCL
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE Linux Enterprise Server 12 SP3-LTSS
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE OpenStack Cloud 7
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE OpenStack Cloud 8
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1
SUSE OpenStack Cloud Crowbar 8
openssh-7.2p2-74.57.1
openssh-askpass-gnome-7.2p2-74.57.1
openssh-fips-7.2p2-74.57.1
openssh-helpers-7.2p2-74.57.1

Описание

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.


Затронутые продукты
HPE Helion OpenStack 8:openssh-7.2p2-74.57.1
HPE Helion OpenStack 8:openssh-askpass-gnome-7.2p2-74.57.1
HPE Helion OpenStack 8:openssh-fips-7.2p2-74.57.1
HPE Helion OpenStack 8:openssh-helpers-7.2p2-74.57.1

Ссылки