Novell is now a part of Micro Focus

Security Update for OpenSSH


(Last modified: 06MAR2002)

solutions Security Update for OpenSSH SuSE Linux Maintenance Web (0aa860ce89005f4c4ef7535390f1afed)

Applies to

Product(s): SuSE Linux Database Server
SuSE Linux Admin-CD for Firewall
SuSE eMail Server III
SuSE Linux Enterprise Server 7 for PowerPC

SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE Firewall Adminhost VPN
SuSE Linux Connectivity Server

Package: openssh
Release: 20020306
Obsoletes: e9aafbd85754b4729ac785a5921ac1df


Everyone having installed OpenSSH (either client or dÆmon) should install this security update. Please check with rpm -qi openssh whether OpenSSH is installed.



Problem description

There is a bug in the routine responsible for checking a channel ID. This bug is exploitable on the server-side if a user is able to log in (local attack). Since the code is also present in the client, a server may be able to attack the client. By consequence, this bug qualifies for both a local and a remote vulnerability. If exploited, an attacker can execute arbitrary code in the context of the ssh/sshd process on the attacked machine.


Please install the updates provided at the location noted below.

Installation notes

For the SuSE Firewall Live CD
The next update of the Live CD will include this update of OpenSSH. Please refer to the upcoming SuSE Maintenance Web article on how to utilize the new disk. Until then we strongly recommend to avoid using the OpenSSH client on the Live CD for connections to untrusted hosts.
All other products
This update is provided as an RPM package that can easily be installed onto a running system by using this command:
rpm -Uvh openssh.rpm
After applying the updated RPM package it is necessary to restart the running SSH dÆmon for the changed package to become effective:
rcsshd restart

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Micro Focus