Описание
Security update for openssh
This update for openssh fixes the following issues:
- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).
- Supplement libgtk-3-0 instead of libX11-6 to avoid installation on a textmode install (bsc#1142000)
- Fixed an issue where oracle cluster with cluvfy using 'scp' failing/missinterpreted (bsc#1148566).
- Fixed sshd termination of multichannel sessions with non-root users (bsc#1115550,bsc#1174162).
- Added speculative hardening for key storage (bsc#1139398).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Список пакетов
openSUSE Leap 15.1
openssh-7.9p1-lp151.4.18.1
openssh-askpass-gnome-7.9p1-lp151.4.18.1
openssh-cavs-7.9p1-lp151.4.18.1
openssh-fips-7.9p1-lp151.4.18.1
openssh-helpers-7.9p1-lp151.4.18.1
Ссылки
- E-Mail link for openSUSE-SU-2020:2298-1
- SUSE Security Ratings
- SUSE Bug 1115550
- SUSE Bug 1139398
- SUSE Bug 1142000
- SUSE Bug 1148566
- SUSE Bug 1173513
- SUSE Bug 1174162
- SUSE CVE CVE-2020-14145 page
Описание
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
Затронутые продукты
openSUSE Leap 15.1:openssh-7.9p1-lp151.4.18.1
openSUSE Leap 15.1:openssh-askpass-gnome-7.9p1-lp151.4.18.1
openSUSE Leap 15.1:openssh-cavs-7.9p1-lp151.4.18.1
openSUSE Leap 15.1:openssh-fips-7.9p1-lp151.4.18.1
Ссылки
- CVE-2020-14145
- SUSE Bug 1173513
- SUSE Bug 1177569
- SUSE Bug 1189078