SUSE-SU-2018:3686-1 -- SLES opensshID: oval:org.secpod.oval:def:89049733 | Date: (C)2023-10-02 (M)2023-10-02 |
Class: PATCH | Family: unix |
This update for openssh fixes the following issues: - CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. OpenSSH developers do not want to treat such a username enumeration as a vulnerability. - CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. The following non-security issues were fixed: - Stop leaking File descriptors - sftp-client.c returns wrong error code upon failure - added pam_keyinit to pam configuration file
Platform: |
SUSE Linux Enterprise Server 15 |
SUSE Linux Enterprise Desktop 15 |