Skip to navigation

Security Advisory openssh security update

Advisory: RHSA-2006:0044-14
Type: Security Advisory
Severity: Low
Issued on: 2006-03-07
Last updated on: 2006-03-07
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-0225

Details

Updated openssh packages that fix bugs in sshd and add auditing of user
logins are now available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.

An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. The Common Vulnerabilities and Exposures
project (cve.mitre.org) assigned the name CVE-2006-0225 to this issue.

The following issue has also been fixed in this update:

* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.

Additionally, this update implements auditing of user logins through the
system audit service.

All users of openssh should upgrade to these updated packages, which
resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2578e547e59c73fdca370de8e98c5503
 
IA-32:
openssh-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 21757cc7559d10b6c0d129ad09f7457b
openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d8f08434752602146534024a54d8597e
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 73f9af460966644a1996be486cbd2cfc
openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d753e37401a9a8bc837232c8c04565fe
openssh-server-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: ed7c9a6d9dcdb8104da21f65fb318c8f
 
x86_64:
openssh-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 538abab594c138be17494e21eef0f8c0
openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 74fb1a3069203034430479b873e229e5
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9eaf5f509a4442aa921751a73bd29e94
openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 08f183cef545498fc81ee61fba9e5ef5
openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eda71f6f994a92a323058e9e8c2ba4f9
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2578e547e59c73fdca370de8e98c5503
 
IA-32:
openssh-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 21757cc7559d10b6c0d129ad09f7457b
openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d8f08434752602146534024a54d8597e
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 73f9af460966644a1996be486cbd2cfc
openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d753e37401a9a8bc837232c8c04565fe
openssh-server-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: ed7c9a6d9dcdb8104da21f65fb318c8f
 
IA-64:
openssh-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 4e7aa26129bf1905d97faf99b8e116b4
openssh-askpass-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9d66c16e57e3c21b3678dd12d1851f10
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 11ff74898dfe0ace6fc2f0ff5e89c24c
openssh-clients-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 70fc3a2a4b8f641203673b1f62282c33
openssh-server-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: de9c83fa4b93dea3f8d42b4df4fd569a
 
PPC:
openssh-3.9p1-8.RHEL4.12.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: 46b6e719c56a74aa46e191c2f36999e3
openssh-askpass-3.9p1-8.RHEL4.12.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: 7cd82332e39423ba4698875b31e43623
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: 387227b69d7a1be97fa3368c84907f41
openssh-clients-3.9p1-8.RHEL4.12.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: 8e3c9db269da8a446baa6e0f61faf43c
openssh-server-3.9p1-8.RHEL4.12.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: dd99de85e9e030b6624fb698e3775322
 
s390:
openssh-3.9p1-8.RHEL4.12.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 6f17b04da53dd4deba4c6a43983e94af
openssh-askpass-3.9p1-8.RHEL4.12.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 48ef2ac4db2a7d9596de43f9dc27cdff
openssh-askpass-gnome-3.9p1-8.RHEL4.12.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9a2d946cecb4fd484c769ebd54541b2e
openssh-clients-3.9p1-8.RHEL4.12.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: f9f5373f55575664a575caf776ffde43
openssh-server-3.9p1-8.RHEL4.12.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 6a79297b27544cc7fc7d971d5979fccd
 
s390x:
openssh-3.9p1-8.RHEL4.12.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: ca31fdbf5a061487d602174f9fe23f48
openssh-askpass-3.9p1-8.RHEL4.12.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: cddba42d826ab7825058d1a07b0cee80
openssh-askpass-gnome-3.9p1-8.RHEL4.12.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: eff616e124743dc63d2d9f3789f4da18
openssh-clients-3.9p1-8.RHEL4.12.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: 579853e1cd8415e7f24c4c477ea919e6
openssh-server-3.9p1-8.RHEL4.12.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: 0cd9686cdfa1f751fc7c39783fbf29ae
 
x86_64:
openssh-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 538abab594c138be17494e21eef0f8c0
openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 74fb1a3069203034430479b873e229e5
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9eaf5f509a4442aa921751a73bd29e94
openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 08f183cef545498fc81ee61fba9e5ef5
openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eda71f6f994a92a323058e9e8c2ba4f9
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2578e547e59c73fdca370de8e98c5503
 
IA-32:
openssh-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 21757cc7559d10b6c0d129ad09f7457b
openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d8f08434752602146534024a54d8597e
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 73f9af460966644a1996be486cbd2cfc
openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d753e37401a9a8bc837232c8c04565fe
openssh-server-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: ed7c9a6d9dcdb8104da21f65fb318c8f
 
IA-64:
openssh-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 4e7aa26129bf1905d97faf99b8e116b4
openssh-askpass-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9d66c16e57e3c21b3678dd12d1851f10
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 11ff74898dfe0ace6fc2f0ff5e89c24c
openssh-clients-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 70fc3a2a4b8f641203673b1f62282c33
openssh-server-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: de9c83fa4b93dea3f8d42b4df4fd569a
 
x86_64:
openssh-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 538abab594c138be17494e21eef0f8c0
openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 74fb1a3069203034430479b873e229e5
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9eaf5f509a4442aa921751a73bd29e94
openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 08f183cef545498fc81ee61fba9e5ef5
openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eda71f6f994a92a323058e9e8c2ba4f9
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2578e547e59c73fdca370de8e98c5503
 
IA-32:
openssh-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 21757cc7559d10b6c0d129ad09f7457b
openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d8f08434752602146534024a54d8597e
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 73f9af460966644a1996be486cbd2cfc
openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d753e37401a9a8bc837232c8c04565fe
openssh-server-3.9p1-8.RHEL4.12.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: ed7c9a6d9dcdb8104da21f65fb318c8f
 
IA-64:
openssh-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 4e7aa26129bf1905d97faf99b8e116b4
openssh-askpass-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9d66c16e57e3c21b3678dd12d1851f10
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 11ff74898dfe0ace6fc2f0ff5e89c24c
openssh-clients-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 70fc3a2a4b8f641203673b1f62282c33
openssh-server-3.9p1-8.RHEL4.12.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: de9c83fa4b93dea3f8d42b4df4fd569a
 
x86_64:
openssh-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 538abab594c138be17494e21eef0f8c0
openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 74fb1a3069203034430479b873e229e5
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9eaf5f509a4442aa921751a73bd29e94
openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 08f183cef545498fc81ee61fba9e5ef5
openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eda71f6f994a92a323058e9e8c2ba4f9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

170466 - CVE-2006-0225 local to local copy uses shell expansion twice
170468 - init script kills all running sshd's if listening server is stopped
170568 - add audit message to sshd


References


Keywords

audit, initscript, killed, system


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/