|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2012:1045-1)|
|Summary:||The remote host is missing an update for the 'openssh' package(s) announced via the SUSE-SU-2012:1045-1 advisory.|
The remote host is missing an update for the 'openssh' package(s) announced via the SUSE-SU-2012:1045-1 advisory.
This collective security update of openssh fixes multiple security issues:
* memory exhaustion in gssapi due to integer overflow
* forced command option information leak (bnc#744643,
Additionally, the following bug has been fixed:
* bnc#752354 server-side delay upon user exiting a ssh session, due to DNS queries from libaudit
'openssh' package(s) on SUSE Linux Enterprise Server 11 SP2, SUSE Linux Enterprise Server 11 SP1, SUSE Linux Enterprise Desktop 11 SP2, SUSE Linux Enterprise Desktop 11 SP1
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2011-5000|
RedHat Security Advisories: RHSA-2012:0884
Common Vulnerability Exposure (CVE) ID: CVE-2012-0814
BugTraq ID: 51702
XForce ISS Database: opensshserver-commands-info-disc(72756)
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.