[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:3686-1 -- SLES openssh

ID: oval:org.secpod.oval:def:89049733Date: (C)2023-10-02   (M)2023-10-02
Class: PATCHFamily: unix




This update for openssh fixes the following issues: - CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration as a vulnerability. - CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. The following non-security issues were fixed: - Stop leaking File descriptors - sftp-client.c returns wrong error code upon failure - added pam_keyinit to pam configuration file

Platform:
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Desktop 15
Product:
openssh
Reference:
SUSE-SU-2018:3686-1
CVE-2018-15473
CVE-2018-15919
CVE    2
CVE-2018-15919
CVE-2018-15473
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:15
cpe:/a:openbsd:openssh

© SecPod Technologies