Skip to navigation

Security Advisory Moderate: openssh security and bug fix update

Advisory: RHSA-2007:0540-3
Type: Security Advisory
Severity: Moderate
Issued on: 2007-11-07
Last updated on: 2007-11-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2006-5052
CVE-2007-3102

Details

Updated openssh packages that fix a security issue and various bugs are now
available.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.

A flaw was found in the way the ssh server wrote account names to the audit
subsystem. An attacker could inject strings containing parts of audit
messages, which could possibly mislead or confuse audit log parsing tools.
(CVE-2007-3102)

A flaw was found in the way the OpenSSH server processes GSSAPI
authentication requests. When GSSAPI authentication was enabled in the
OpenSSH server, a remote attacker was potentially able to determine if a
username is valid. (CVE-2006-5052)

The following bugs in SELinux MLS (Multi-Level Security) support has also
been fixed in this update:

* It was sometimes not possible to select a SELinux role and level when
logging in using ssh.

* If the user obtained a non-default SELinux role or level, the role change
was not recorded in the audit subsystem.

* In some cases, on labeled networks, sshd allowed logins from level ranges
it should not allow.

The updated packages also contain experimental support for using private
keys stored in PKCS#11 tokens for client authentication. The support is
provided through the NSS (Network Security Services) library.

All users of openssh should upgrade to these updated packages, which
contain patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
openssh-4.3p2-24.el5.src.rpm
File outdated by:  RHBA-2012:0237
    MD5: 153a17e8f011bde6d984ce73b92cebff
 
IA-32:
openssh-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: ba4d6b70e9de7860b5ebe370ca5cdf53
openssh-askpass-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: d7b28f340fe82d28660876ca6bcc0a35
openssh-clients-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: c4216b9a462e5f0462096f1d9b6b8d5f
openssh-server-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 9f17e3dfe06fbbed05f765abd6b2509a
 
IA-64:
openssh-4.3p2-24.el5.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 5a4b28d5af0be02b37e02ae0aed692aa
openssh-askpass-4.3p2-24.el5.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: b2672d6bc6fbbd29414d23523631ac03
openssh-clients-4.3p2-24.el5.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 2e7e42fd888d7fb1a87531e3f7a58889
openssh-server-4.3p2-24.el5.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: e909c8bac59183dfe6f47f1e71c5306e
 
PPC:
openssh-4.3p2-24.el5.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 7c4fbb3d8e40b083acdbd6a5186e1db3
openssh-askpass-4.3p2-24.el5.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 4f878a818e9fd07d16becbf66e35389f
openssh-clients-4.3p2-24.el5.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 9c31ff09ef6ca0a20bba14fb89c3e250
openssh-server-4.3p2-24.el5.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 3187b878bf79dc71e226ae8096f07081
 
s390x:
openssh-4.3p2-24.el5.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: f4c3b2d6c3b170376f0e3fce0b1f38ec
openssh-askpass-4.3p2-24.el5.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: ab38b48be3d112c5aa333296bd9cbc3f
openssh-clients-4.3p2-24.el5.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: 03643d364acf47e086c913c95dae8cb2
openssh-server-4.3p2-24.el5.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: 0d6286527c165d1df00ece5761fcefed
 
x86_64:
openssh-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 67538525ad7cf2f1d310a429b44890c7
openssh-askpass-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 37118e168b7a55531459b4743d3522fb
openssh-clients-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 6ce7070b90732f3c837df5cfc9287187
openssh-server-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: a7141781bfe5f21f2fc5b192ebf6693e
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
openssh-4.3p2-24.el5.src.rpm
File outdated by:  RHBA-2012:0237
    MD5: 153a17e8f011bde6d984ce73b92cebff
 
IA-32:
openssh-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: ba4d6b70e9de7860b5ebe370ca5cdf53
openssh-askpass-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: d7b28f340fe82d28660876ca6bcc0a35
openssh-clients-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: c4216b9a462e5f0462096f1d9b6b8d5f
openssh-server-4.3p2-24.el5.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 9f17e3dfe06fbbed05f765abd6b2509a
 
x86_64:
openssh-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 67538525ad7cf2f1d310a429b44890c7
openssh-askpass-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 37118e168b7a55531459b4743d3522fb
openssh-clients-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 6ce7070b90732f3c837df5cfc9287187
openssh-server-4.3p2-24.el5.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: a7141781bfe5f21f2fc5b192ebf6693e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

227733 - [LSPP] unable to ssh into a system as root/auditadm_r
229278 - LSPP: ssh-mls allows a level through that it should not
231695 - LSPP: user unable to ssh to system with user/role/level context
234638 - CVE-2006-5052 GSSAPI information leak
234951 - [LSPP] openssh server fails to parse level correctly
248059 - CVE-2007-3102 audit logging of failed logins


References


Keywords

audit, GSSAPI, krb5, level, MLS, NSS, role, SELinux, token


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/