Security update for openssh
Announcement ID: | SUSE-SU-2020:3866-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has five security fixes can now be installed.
Description:
This update for openssh fixes the following issues:
- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).
- Supplement libgtk-3-0 instead of libX11-6 to avoid installation on a textmode install (bsc#1142000)
- Fixed an issue where oracle cluster with cluvfy using "scp" failing/missinterpreted (bsc#1148566).
- Fixed sshd termination of multichannel sessions with non-root users (bsc#1115550,bsc#1174162).
- Added speculative hardening for key storage (bsc#1139398).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-3866=1
-
Desktop Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3866=1
-
Server Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-3866=1
Package List:
-
Basesystem Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- openssh-debugsource-7.9p1-6.22.1
- openssh-helpers-7.9p1-6.22.1
- openssh-helpers-debuginfo-7.9p1-6.22.1
- openssh-7.9p1-6.22.1
- openssh-debuginfo-7.9p1-6.22.1
-
Desktop Applications Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- openssh-askpass-gnome-debugsource-7.9p1-6.22.1
- openssh-askpass-gnome-debuginfo-7.9p1-6.22.1
- openssh-askpass-gnome-7.9p1-6.22.1
-
Server Applications Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- openssh-fips-7.9p1-6.22.1
- openssh-debugsource-7.9p1-6.22.1
- openssh-debuginfo-7.9p1-6.22.1
References:
- https://www.suse.com/security/cve/CVE-2020-14145.html
- https://bugzilla.suse.com/show_bug.cgi?id=1115550
- https://bugzilla.suse.com/show_bug.cgi?id=1139398
- https://bugzilla.suse.com/show_bug.cgi?id=1142000
- https://bugzilla.suse.com/show_bug.cgi?id=1148566
- https://bugzilla.suse.com/show_bug.cgi?id=1173513
- https://bugzilla.suse.com/show_bug.cgi?id=1174162