Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2010:0193 - Bug Fix Advisory
Issued:
2010-03-30
Updated:
2010-03-30

RHBA-2010:0193 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

openssh bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openssh packages that fix various bugs and add an enhancement are
now available.

Description

OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.

These packages address the following bugs:

  • When sshd used multiple SFTP channels simultaneously, each SFTP channel

leaked a unix socket. This socket leak could have eventually caused the
sshd daemon to monopolize system resources. The bug has been fixed with
these updated packages by ensuring that there is no socket leak within a
subsystem. (BZ#530358)

  • If a zero length SSH2 DSA key existed, the ssh init script would hang.

This issue has been fixed by allowing the ssh init script to automatically
overwrite any zero length keys that exist. The ssh init script now
functions as expected, even if a zero length key exists before execution of
the script. (BZ#531738)

As well, these updated packages add the following enhancement:

  • A call to RAND_cleanup() has been added to ssh and sshd to clean the PRNG

status when exiting the program. This enhancement also ensures FIPS-140-2
compliance. (BZ#557164)

All openssh users should upgrade to these updated packages, which resolve
these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 530358 - sshd leaks a unix socket after each use of a sftp channel
  • BZ - 531738 - System hangs when generating SSH2 DSA key

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
openssh-4.3p2-41.el5.src.rpm SHA-256: 4f40b31bd148e331f49c568c08f6b5a7b82f569148fd3826ce16a977d9bcb384
x86_64
openssh-4.3p2-41.el5.x86_64.rpm SHA-256: 3ff9e0944e0dc11cea599c48a18d0d657b7fd2d8acbe23f25a7afbcfa5911d11
openssh-askpass-4.3p2-41.el5.x86_64.rpm SHA-256: 8561d030cd797f61f76993544eacb6e3bffebf459bfcf766315f98d812b863ea
openssh-clients-4.3p2-41.el5.x86_64.rpm SHA-256: 2826d6951d49e217ccb3bcf7e05b4322afd568be890f99966a952d506e710154
openssh-server-4.3p2-41.el5.x86_64.rpm SHA-256: c286901307e47fbf31a76c8edaea218507eae80836fd634a2669904bfeac9d78
ia64
openssh-4.3p2-41.el5.ia64.rpm SHA-256: 3267c15edba7d04fa7572abf9a5fe57f9002a576c7282e70e1ca68e2e7c95fc6
openssh-askpass-4.3p2-41.el5.ia64.rpm SHA-256: 5011a33264b271840fba5814c228e758bbdc801e5e422766c5733265629e2acb
openssh-clients-4.3p2-41.el5.ia64.rpm SHA-256: 9ea91a204a0533e64b371c070e4d30a522f31c6977e22cb65e3731314f5984aa
openssh-server-4.3p2-41.el5.ia64.rpm SHA-256: 3115ccc713d9a582ed57feb3b2d0a1e92a147eedef80e935a4f510cb89871dac
i386
openssh-4.3p2-41.el5.i386.rpm SHA-256: a9be9bdfeb35777bde2a4fd249b3c6b2d2fc7aa9a03ec04da7b1d55878503caf
openssh-askpass-4.3p2-41.el5.i386.rpm SHA-256: 60622ac647efa583d9891ceba35ea3aa1448b3ce3c8bf856ba628c69a8fbab93
openssh-clients-4.3p2-41.el5.i386.rpm SHA-256: 7453661c486ec6092e7d45497a9133eb4c97e82b3ff18af60c2c23af14a02081
openssh-server-4.3p2-41.el5.i386.rpm SHA-256: c2c4fd3a83b28ab899e7a00ae29278ce04ac386c02154a8b15ed5283156fcd99

Red Hat Enterprise Linux Workstation 5

SRPM
openssh-4.3p2-41.el5.src.rpm SHA-256: 4f40b31bd148e331f49c568c08f6b5a7b82f569148fd3826ce16a977d9bcb384
x86_64
openssh-4.3p2-41.el5.x86_64.rpm SHA-256: 3ff9e0944e0dc11cea599c48a18d0d657b7fd2d8acbe23f25a7afbcfa5911d11
openssh-askpass-4.3p2-41.el5.x86_64.rpm SHA-256: 8561d030cd797f61f76993544eacb6e3bffebf459bfcf766315f98d812b863ea
openssh-clients-4.3p2-41.el5.x86_64.rpm SHA-256: 2826d6951d49e217ccb3bcf7e05b4322afd568be890f99966a952d506e710154
openssh-server-4.3p2-41.el5.x86_64.rpm SHA-256: c286901307e47fbf31a76c8edaea218507eae80836fd634a2669904bfeac9d78
i386
openssh-4.3p2-41.el5.i386.rpm SHA-256: a9be9bdfeb35777bde2a4fd249b3c6b2d2fc7aa9a03ec04da7b1d55878503caf
openssh-askpass-4.3p2-41.el5.i386.rpm SHA-256: 60622ac647efa583d9891ceba35ea3aa1448b3ce3c8bf856ba628c69a8fbab93
openssh-clients-4.3p2-41.el5.i386.rpm SHA-256: 7453661c486ec6092e7d45497a9133eb4c97e82b3ff18af60c2c23af14a02081
openssh-server-4.3p2-41.el5.i386.rpm SHA-256: c2c4fd3a83b28ab899e7a00ae29278ce04ac386c02154a8b15ed5283156fcd99

Red Hat Enterprise Linux Desktop 5

SRPM
openssh-4.3p2-41.el5.src.rpm SHA-256: 4f40b31bd148e331f49c568c08f6b5a7b82f569148fd3826ce16a977d9bcb384
x86_64
openssh-4.3p2-41.el5.x86_64.rpm SHA-256: 3ff9e0944e0dc11cea599c48a18d0d657b7fd2d8acbe23f25a7afbcfa5911d11
openssh-askpass-4.3p2-41.el5.x86_64.rpm SHA-256: 8561d030cd797f61f76993544eacb6e3bffebf459bfcf766315f98d812b863ea
openssh-clients-4.3p2-41.el5.x86_64.rpm SHA-256: 2826d6951d49e217ccb3bcf7e05b4322afd568be890f99966a952d506e710154
openssh-server-4.3p2-41.el5.x86_64.rpm SHA-256: c286901307e47fbf31a76c8edaea218507eae80836fd634a2669904bfeac9d78
i386
openssh-4.3p2-41.el5.i386.rpm SHA-256: a9be9bdfeb35777bde2a4fd249b3c6b2d2fc7aa9a03ec04da7b1d55878503caf
openssh-askpass-4.3p2-41.el5.i386.rpm SHA-256: 60622ac647efa583d9891ceba35ea3aa1448b3ce3c8bf856ba628c69a8fbab93
openssh-clients-4.3p2-41.el5.i386.rpm SHA-256: 7453661c486ec6092e7d45497a9133eb4c97e82b3ff18af60c2c23af14a02081
openssh-server-4.3p2-41.el5.i386.rpm SHA-256: c2c4fd3a83b28ab899e7a00ae29278ce04ac386c02154a8b15ed5283156fcd99

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
openssh-4.3p2-41.el5.src.rpm SHA-256: 4f40b31bd148e331f49c568c08f6b5a7b82f569148fd3826ce16a977d9bcb384
s390x
openssh-4.3p2-41.el5.s390x.rpm SHA-256: 82da1c7c82f3ba992457de53172cbf38027194fb7915f0cf24ebc3c36de6c723
openssh-askpass-4.3p2-41.el5.s390x.rpm SHA-256: bb36525dbda711f4ef4e1fa6cd102cb547cfbbf39b59929b38ee9d51eb5d4d33
openssh-clients-4.3p2-41.el5.s390x.rpm SHA-256: c34654625f9e3f1a6d218b8e920c604782c4c73e348867ed2af9577418c5472d
openssh-server-4.3p2-41.el5.s390x.rpm SHA-256: f5f76e50c461dffa925af2613ab2886f9a3f603601c95a3e3a276a22564f1ce4

Red Hat Enterprise Linux for Power, big endian 5

SRPM
openssh-4.3p2-41.el5.src.rpm SHA-256: 4f40b31bd148e331f49c568c08f6b5a7b82f569148fd3826ce16a977d9bcb384
ppc
openssh-4.3p2-41.el5.ppc.rpm SHA-256: f77fc4e29e060d7bc7a5a03b4ed5bbca47b860b20ab105c77a82ca17746cc9f7
openssh-askpass-4.3p2-41.el5.ppc.rpm SHA-256: 1a07e7642de4c8cb4dbf991ffdeeb54dc24c7fa97de6678b69ae3327f756b112
openssh-clients-4.3p2-41.el5.ppc.rpm SHA-256: 9694d710b8f7e43c511cb9272d5dde9da00885e659d9ddfc1c0b27a777c40b62
openssh-server-4.3p2-41.el5.ppc.rpm SHA-256: a39ede0d2d4354429c7e5e44624fe2ed9cf1a61c1c5de74bfaf57a8c5296b8da

Red Hat Enterprise Linux Server from RHUI 5

SRPM
openssh-4.3p2-41.el5.src.rpm SHA-256: 4f40b31bd148e331f49c568c08f6b5a7b82f569148fd3826ce16a977d9bcb384
x86_64
openssh-4.3p2-41.el5.x86_64.rpm SHA-256: 3ff9e0944e0dc11cea599c48a18d0d657b7fd2d8acbe23f25a7afbcfa5911d11
openssh-askpass-4.3p2-41.el5.x86_64.rpm SHA-256: 8561d030cd797f61f76993544eacb6e3bffebf459bfcf766315f98d812b863ea
openssh-clients-4.3p2-41.el5.x86_64.rpm SHA-256: 2826d6951d49e217ccb3bcf7e05b4322afd568be890f99966a952d506e710154
openssh-server-4.3p2-41.el5.x86_64.rpm SHA-256: c286901307e47fbf31a76c8edaea218507eae80836fd634a2669904bfeac9d78
i386
openssh-4.3p2-41.el5.i386.rpm SHA-256: a9be9bdfeb35777bde2a4fd249b3c6b2d2fc7aa9a03ec04da7b1d55878503caf
openssh-askpass-4.3p2-41.el5.i386.rpm SHA-256: 60622ac647efa583d9891ceba35ea3aa1448b3ce3c8bf856ba628c69a8fbab93
openssh-clients-4.3p2-41.el5.i386.rpm SHA-256: 7453661c486ec6092e7d45497a9133eb4c97e82b3ff18af60c2c23af14a02081
openssh-server-4.3p2-41.el5.i386.rpm SHA-256: c2c4fd3a83b28ab899e7a00ae29278ce04ac386c02154a8b15ed5283156fcd99

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility