Skip to navigation

Security Advisory Moderate: openssh security and bug fix update

Advisory: RHSA-2007:0703-7
Type: Security Advisory
Severity: Moderate
Issued on: 2007-11-15
Last updated on: 2007-11-15
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-5052
CVE-2007-3102

Details

Updated openssh packages that fix two security issues and various bugs are
now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.

A flaw was found in the way the ssh server wrote account names to the
audit subsystem. An attacker could inject strings containing parts of audit
messages which could possibly mislead or confuse audit log parsing tools.
(CVE-2007-3102)

A flaw was found in the way the OpenSSH server processes GSSAPI
authentication requests. When GSSAPI authentication was enabled in OpenSSH
server, a remote attacker may have been able to determine if a username is
valid. (CVE-2006-5052)

The following bugs were also fixed:

* the ssh daemon did not generate audit messages when an ssh session was
closed.

* GSSAPI authentication sometimes failed on clusters using DNS or
load-balancing.

* the sftp client and server leaked small amounts of memory in some cases.

* the sftp client didn't properly exit and return non-zero status in batch
mode when the destination disk drive was full.

* when restarting the ssh daemon with the initscript, the ssh daemon was
sometimes not restarted successfully because the old running ssh daemon was
not properly killed.

* with challenge/response authentication enabled, the pam sub-process was
not terminated if the user authentication timed out.

All users of openssh should upgrade to these updated packages, which
contain patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.24.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 992bd7328b7f1f75dcc8baa55a046af9
 
IA-32:
openssh-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: b24a8ab5d98e6228e3481f02a84fdd57
openssh-askpass-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 7a95a717c6eddcd4368a36f30e076115
openssh-askpass-gnome-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d899419b3a87e60ef5db51c1be9b6912
openssh-clients-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 77204f50d001cd7e017b9a93e335f0ae
openssh-server-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2872564cd520d3d147bd365889e17482
 
x86_64:
openssh-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3f3f36e4d297773f61e3e17ac7f6ed0a
openssh-askpass-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2612644682ec5352f3fae561c7b44726
openssh-askpass-gnome-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 591928dbd4758a9154057f3829d6d94c
openssh-clients-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9badc94b3f376570e0d6950f1745706a
openssh-server-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eb5ab43889ade69fab74eed1e3fbf1bc
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.24.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 992bd7328b7f1f75dcc8baa55a046af9
 
IA-32:
openssh-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: b24a8ab5d98e6228e3481f02a84fdd57
openssh-askpass-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 7a95a717c6eddcd4368a36f30e076115
openssh-askpass-gnome-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d899419b3a87e60ef5db51c1be9b6912
openssh-clients-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 77204f50d001cd7e017b9a93e335f0ae
openssh-server-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2872564cd520d3d147bd365889e17482
 
IA-64:
openssh-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2345c59f78a78021999fcd5daef96dc5
openssh-askpass-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 6e09634082c89e05c27c367abfe7aa7c
openssh-askpass-gnome-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: cb0284c7038be47eac7c32cf5570e4e0
openssh-clients-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3832e1c1a31a65dece2d92e5f7eb16c4
openssh-server-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3c4f0673cfc98882c232640398b7d7cf
 
PPC:
openssh-3.9p1-8.RHEL4.24.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: 53060528e9229524798a73ca495962c4
openssh-askpass-3.9p1-8.RHEL4.24.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: b7248560188ece96e961f6f382d27a59
openssh-askpass-gnome-3.9p1-8.RHEL4.24.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: 4db8fc61fc626078327333fdbb571c90
openssh-clients-3.9p1-8.RHEL4.24.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: 98a35ed02e08e4454f70cf6b38fb2921
openssh-server-3.9p1-8.RHEL4.24.ppc.rpm
File outdated by:  RHEA-2010:0511
    MD5: c8354a653aa2fe3c199957c4bf953d78
 
s390:
openssh-3.9p1-8.RHEL4.24.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 47d7a9c398dbf3c86bbf00d04f07556a
openssh-askpass-3.9p1-8.RHEL4.24.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: bd59f3199707bd28b8d95f1aedfa0096
openssh-askpass-gnome-3.9p1-8.RHEL4.24.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 06b586440d59ec50313dc8ac140add12
openssh-clients-3.9p1-8.RHEL4.24.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 435b94cbee03fdc33a391df27950093c
openssh-server-3.9p1-8.RHEL4.24.s390.rpm
File outdated by:  RHEA-2010:0511
    MD5: 039cb6762cb9812cd5a9c505e89be8f9
 
s390x:
openssh-3.9p1-8.RHEL4.24.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: 7d0a1fabfb1f10dfa762a1942335cf17
openssh-askpass-3.9p1-8.RHEL4.24.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: 6a9ebd003cf30248bc118f022821cb97
openssh-askpass-gnome-3.9p1-8.RHEL4.24.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: 613f9aa103222da201182eb52c7acd48
openssh-clients-3.9p1-8.RHEL4.24.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: bddb563234253e3ccd3047c0673f86f1
openssh-server-3.9p1-8.RHEL4.24.s390x.rpm
File outdated by:  RHEA-2010:0511
    MD5: 82e73518f9184c9ce6db15fd12109640
 
x86_64:
openssh-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3f3f36e4d297773f61e3e17ac7f6ed0a
openssh-askpass-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2612644682ec5352f3fae561c7b44726
openssh-askpass-gnome-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 591928dbd4758a9154057f3829d6d94c
openssh-clients-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9badc94b3f376570e0d6950f1745706a
openssh-server-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eb5ab43889ade69fab74eed1e3fbf1bc
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.24.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 992bd7328b7f1f75dcc8baa55a046af9
 
IA-32:
openssh-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: b24a8ab5d98e6228e3481f02a84fdd57
openssh-askpass-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 7a95a717c6eddcd4368a36f30e076115
openssh-askpass-gnome-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d899419b3a87e60ef5db51c1be9b6912
openssh-clients-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 77204f50d001cd7e017b9a93e335f0ae
openssh-server-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2872564cd520d3d147bd365889e17482
 
IA-64:
openssh-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2345c59f78a78021999fcd5daef96dc5
openssh-askpass-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 6e09634082c89e05c27c367abfe7aa7c
openssh-askpass-gnome-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: cb0284c7038be47eac7c32cf5570e4e0
openssh-clients-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3832e1c1a31a65dece2d92e5f7eb16c4
openssh-server-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3c4f0673cfc98882c232640398b7d7cf
 
x86_64:
openssh-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3f3f36e4d297773f61e3e17ac7f6ed0a
openssh-askpass-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2612644682ec5352f3fae561c7b44726
openssh-askpass-gnome-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 591928dbd4758a9154057f3829d6d94c
openssh-clients-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9badc94b3f376570e0d6950f1745706a
openssh-server-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eb5ab43889ade69fab74eed1e3fbf1bc
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
openssh-3.9p1-8.RHEL4.24.src.rpm
File outdated by:  RHEA-2010:0511
    MD5: 992bd7328b7f1f75dcc8baa55a046af9
 
IA-32:
openssh-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: b24a8ab5d98e6228e3481f02a84fdd57
openssh-askpass-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 7a95a717c6eddcd4368a36f30e076115
openssh-askpass-gnome-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: d899419b3a87e60ef5db51c1be9b6912
openssh-clients-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 77204f50d001cd7e017b9a93e335f0ae
openssh-server-3.9p1-8.RHEL4.24.i386.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2872564cd520d3d147bd365889e17482
 
IA-64:
openssh-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2345c59f78a78021999fcd5daef96dc5
openssh-askpass-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 6e09634082c89e05c27c367abfe7aa7c
openssh-askpass-gnome-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: cb0284c7038be47eac7c32cf5570e4e0
openssh-clients-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3832e1c1a31a65dece2d92e5f7eb16c4
openssh-server-3.9p1-8.RHEL4.24.ia64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3c4f0673cfc98882c232640398b7d7cf
 
x86_64:
openssh-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 3f3f36e4d297773f61e3e17ac7f6ed0a
openssh-askpass-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 2612644682ec5352f3fae561c7b44726
openssh-askpass-gnome-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 591928dbd4758a9154057f3829d6d94c
openssh-clients-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: 9badc94b3f376570e0d6950f1745706a
openssh-server-3.9p1-8.RHEL4.24.x86_64.rpm
File outdated by:  RHEA-2010:0511
    MD5: eb5ab43889ade69fab74eed1e3fbf1bc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

234643 - CVE-2006-5052 Kerberos information leak
240909 - memory leak fixed in RHEL3 but present in RHEL4
244655 - Trying to restart a hung/frozen sshd daemon doesn't show correct status
247802 - sftp problem while transferring files to a partition which is 100% full
248058 - CVE-2007-3102 audit logging of failed logins


References


Keywords

audit, DNS, GSSAPI, krb5, leak, memory, pam, restart, session, sftp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/