Security update for OpenSSH
(Last modified: 02JUL2002)
solutions Security update for OpenSSH SuSE Linux Maintenance Web (6383ca0a1fdf5e5142d85d74db95df0c)
SuSE Linux Admin-CD for Firewall
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE eMail Server III
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE eMail Server 3.1
SuSE Firewall Adminhost VPN
SuSE Linux Connectivity Server
rootcompromise in the OpenSSH package. After no specific information about the nature of the hole had been disclosed to SuSE Security and the security world in general for a few days, it is now clear that the default installation on all SuSE products was and is not vulnerable to the defect, provided the administrator did not actively change the ssh daemon configuration of the installation in question. In particular, the options
PAMAuthenticationViaKbdInthave to be turned on to be vulnerable to the problem. Since the SuSE packages of OpenSSH do not have the compile-time enabled support for the one-time password system S/Key, the packages are not vulnerable to the
ChallengeResponseAuthenticationproblem that can be fixed as officially announced (by disabling this option).
The package we offer contains a patch against the
PAMAuthenticationViaKbdIntproblem as officially announced by the openssh development team.
rpm -Uvh openssh.rpm
After package installation, the administrator should restart the ssh daemon for the update package to become effective:
After the restart, the administrator should verify that secure shell login is still possible.
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.