Security update for OpenSSH
SUSE Security Update: Security update for OpenSSH
This update for OpenSSH provides the following fixes:
* Implement remote denial of service hardening.
(bnc#802639, CVE-2010-5107)
* Use only FIPS 140-2 approved algorithms when FIPS
mode is detected. (bnc#755505, bnc#821039)
* Do not link OpenSSH binaries with LDAP libraries.
(bnc#826906)
Security Issue reference:
* CVE-2010-5107
>
Announcement ID: | SUSE-SU-2013:1345-1 |
Rating: | low |
References: | #755505 #802639 #821039 #826906 |
Affected Products: |
An update that solves one vulnerability and has three fixes is now available.
Description:
This update for OpenSSH provides the following fixes:
* Implement remote denial of service hardening.
(bnc#802639, CVE-2010-5107)
* Use only FIPS 140-2 approved algorithms when FIPS
mode is detected. (bnc#755505, bnc#821039)
* Do not link OpenSSH binaries with LDAP libraries.
(bnc#826906)
Security Issue reference:
* CVE-2010-5107
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-openssh-8078
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-openssh-8078
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-openssh-8078
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
- openssh-5.1p1-41.57.1
- openssh-askpass-5.1p1-41.57.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
- openssh-5.1p1-41.57.1
- openssh-askpass-5.1p1-41.57.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
- openssh-5.1p1-41.57.1
- openssh-askpass-5.1p1-41.57.1
References:
- http://support.novell.com/security/cve/CVE-2010-5107.html
- https://bugzilla.novell.com/755505
- https://bugzilla.novell.com/802639
- https://bugzilla.novell.com/821039
- https://bugzilla.novell.com/826906
- http://download.suse.com/patch/finder/?keywords=dd7be5574ffe3cd03de79a99d3b6b9f0