openSUSE Security Update: libssh: reseed randomness on forking server instances ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0366-1 Rating: moderate References: #866278 Cross-References: CVE-2014-0017 Affected Products: openSUSE 13.1 openSUSE 12.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: libssh was updated to fix a random generator reseeding issue when forking multiple servers. Forking multiple servers might under some circumstances get them the same random seed state. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-208 - openSUSE 12.3: zypper in -t patch openSUSE-2014-208 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): libssh-debugsource-0.5.5-2.4.1 libssh-devel-0.5.5-2.4.1 libssh-devel-doc-0.5.5-2.4.1 libssh4-0.5.5-2.4.1 libssh4-debuginfo-0.5.5-2.4.1 - openSUSE 13.1 (x86_64): libssh4-32bit-0.5.5-2.4.1 libssh4-debuginfo-32bit-0.5.5-2.4.1 - openSUSE 12.3 (i586 x86_64): libssh-debugsource-0.5.3-2.4.1 libssh-devel-0.5.3-2.4.1 libssh-devel-doc-0.5.3-2.4.1 libssh4-0.5.3-2.4.1 libssh4-debuginfo-0.5.3-2.4.1 References: http://support.novell.com/security/cve/CVE-2014-0017.html https://bugzilla.novell.com/866278