Описание
Security update for ssh-audit
This update for ssh-audit fixes the following issues:
ssh-audit was updated to version 2.5.0
-
Fixed crash when running host key tests.
-
Handles server connection failures more gracefully.
-
Now prints JSON with indents when -jj is used (useful for debugging).
-
Added MD5 fingerprints to verbose output.
-
Added -d/--debug option for getting debugging output.
-
Updated JSON output to include MD5 fingerprints. Note that this results in a breaking change in the 'fingerprints' dictionary format.
-
Updated OpenSSH 8.1 (and earlier) policies to include rsa-sha2-512 and rsa-sha2-256.
-
Added OpenSSH v8.6 & v8.7 policies.
-
Added 3 new key exchanges:
- gss-gex-sha1-eipGX3TCiQSrx573bT1o1Q==
- gss-group1-sha1-eipGX3TCiQSrx573bT1o1Q==
- gss-group14-sha1-eipGX3TCiQSrx573bT1o1Q==
-
Added 3 new MACs:
- hmac-ripemd160-96
- AEAD_AES_128_GCM
- AEAD_AES_256_GCM
Update to version 2.4.0
- Added multi-threaded scanning support.
- Added version check for OpenSSH user enumeration (CVE-2018-15473).
- Added deprecation note to host key types based on SHA-1.
- Added extra warnings for SSHv1.
- Added built-in hardened OpenSSH v8.5 policy.
- Upgraded warnings to failures for host key types based on SHA-1
- Fixed crash when receiving unexpected response during host key test.
- Fixed hang against older Cisco devices during host key test & gex test.
- Fixed improper termination while scanning multiple targets when one target returns an error.
- Dropped support for Python 3.5 (which reached EOL in Sept.2020)
- Added 1 new key exchange: sntrup761x25519-sha512@openssh.com.
Update to version 2.3.1
- Now parses public key sizes for rsa-sha2-256-cert-v01@openssh.com and rsa-sha2-512-cert-v01@openssh.com host key types.
- Flag ssh-rsa-cert-v01@openssh.com as a failure due to SHA-1 hash.
- Fixed bug in recommendation output which suppressed some algorithms inappropriately.
- Built-in policies now include CA key requirements (if certificates are in use).
- Lookup function (--lookup) now performs case-insensitive lookups of similar algorithms.
- Migrated pre-made policies from external files to internal database.
- Split single 3,500 line script into many files (by class).
- Added setup.py support
- Added 1 new cipher: des-cbc@ssh.com.
Update to version 2.3.0
The highlight of this release is support for policy scanning (this allows an admin to test a server against a hardened/standard configuration).
- Added new policy auditing functionality to test adherence to a hardening guide/standard configuration (see -L/--list-policies, -M/--make-policy and -P/--policy).
- Created new man page (see ssh-audit.1 file).
- 1024-bit moduli upgraded from warnings to failures.
- Many Python 2 code clean-ups, testing framework improvements, pylint & flake8 fixes, and mypy type comments.
- Added feature to look up algorithms in internal database (see --lookup)
- Suppress recommendation of token host key types.
- Added check for use-after-free vulnerability in PuTTY v0.73.
- Added 11 new host key types: ssh-rsa1, ssh-dss-sha256@ssh.com, ssh-gost2001, ssh-gost2012-256, ssh-gost2012-512, spki-sign-rsa, ssh-ed448, x509v3-ecdsa-sha2-nistp256, x509v3-ecdsa-sha2-nistp384, x509v3-ecdsa-sha2-nistp521, x509v3-rsa2048-sha256.
- Added 8 new key exchanges: diffie-hellman-group1-sha256, kexAlgoCurve25519SHA256, Curve25519SHA256, gss-group14-sha256-, gss-group15-sha512-, gss-group16-sha512-, gss-nistp256-sha256-, gss-curve25519-sha256-.
- Added 5 new ciphers: blowfish, AEAD_AES_128_GCM, AEAD_AES_256_GCM, crypticore128@ssh.com, seed-cbc@ssh.com.
- Added 3 new MACs: chacha20-poly1305@openssh.com, hmac-sha3-224, crypticore-mac@ssh.com.
- Update ssh-audit.keyring
Список пакетов
openSUSE Leap 15.2
Ссылки
- E-Mail link for openSUSE-SU-2021:1383-1
- SUSE Security Ratings
- SUSE CVE CVE-2018-15473 page
Описание
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Затронутые продукты
Ссылки
- CVE-2018-15473
- SUSE Bug 1105010
- SUSE Bug 1106163
- SUSE Bug 1123133
- SUSE Bug 1138392
- SUSE Bug 1205621