SUSE-SU-2018:3781-1 -- SLES opensshID: oval:org.secpod.oval:def:89002421 | Date: (C)2021-02-26 (M)2023-03-01 |
Class: PATCH | Family: unix |
This update for openssh fixes the following issues: Following security issues have been fixed: - CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration as a vulnerability. - CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. Also the following security related hardening change was done: - Removed arcfour,blowfish,cast from list of default ciphers as they are long discontinued and should no longer be used. And the following non-security issues were fixed: - Stop leaking File descriptors - sftp-client.c returns wrong error code upon failure
Platform: |
SUSE Linux Enterprise Server 11 SP4 |