Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2011:0018 - Bug Fix Advisory
Issued:
2011-01-12
Updated:
2011-01-12

RHBA-2011:0018 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

openssh bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openssh packages that fix various bugs and add enhancements are now
available for Red Hat Enterprise Linux 5.

Description

OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These packages
include the core files necessary for both the OpenSSH client and server.

These updated packages fix the following bugs:

  • When the ~/.bashrc startup file contained a command that produced an output to

standard error (STDERR), the sftp utility was unable to log in to that account.
This bug has been fixed, and the output to STDERR no longer prevents sftp from
establishing the connection. (BZ#576765)

  • Due to the limitations of the data type that was used to store user identifier

(UID), the lastlog record was not created for users with UID larger than
2147483647. With this update, this data type has been changed to unsigned long
integer, and the /var/log/lastlog database is now updated as expected.
(BZ#616396)

  • Although the OpenSSH update RHSA-2009:1287 mentioned the change of the cipher

preference, the openssh packages did not actually include this adjustment. This
update changes the cipher preference as announced, so that CTR mode ciphers are
now preferred to CBC mode. (BZ#661716)

As well, this update adds the following enhancements:

  • The "ForceCommand" directive has been added as a valid /etc/ssh/sshd_config

option, making it possible to force the execution of the supplied command
regardless of user input. (BZ#532559)

  • The OpenSSL dynamic engine loading support has been added, so that the ibmca

engine can now use Central Processor Assist for Cryptographic Function (CPACF).
(BZ#594815)

  • When a key authentication is used to log in to a machine, the same information

as the one that is logged when using Pluggable Authentication Modules (PAM) is
written to the log file, including the information about the key type and size,
and a fingerprint. Additionally, when an encrypted tunnel is being established,
the sshd daemon now logs the result of the cipher negotiation, that is, the type
and the key size. (BZ#632402, BZ#659242, BZ#661669)

All OpenSSH users are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 616396 - lastlog is not recorded with the big uid
  • BZ - 661669 - The upcoming audit patch causes inability to run sshd as non root
  • BZ - 661716 - openssh: change cipher preference to prefer CRT over CBC ciphers

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
openssh-4.3p2-72.el5.src.rpm SHA-256: 641503e849d73504a0935dd19d0a9b794df400088190cb2c55b657139fff1584
x86_64
openssh-4.3p2-72.el5.x86_64.rpm SHA-256: faac2433139ce60c01c1e4a94a71e0b1269d75614985dcbcaa2c739f71cb3ae8
openssh-askpass-4.3p2-72.el5.x86_64.rpm SHA-256: 0d3849775b345560d1542c28c3651e3070d29ab974311233396c0233298aff23
openssh-clients-4.3p2-72.el5.x86_64.rpm SHA-256: f08c820a288a3b9e27d275aba283b496a47a4694f7e13b3dc285c7e19f158f56
openssh-server-4.3p2-72.el5.x86_64.rpm SHA-256: 4e78db2e392a1ef28de7a777870d5b37e7a9842fa8ab85335a13a015a70ce77d
ia64
openssh-4.3p2-72.el5.ia64.rpm SHA-256: 4360bc3fd47ca9e4a270e1c8f8af9b1801bacd74a81ef900a15033479103ed74
openssh-askpass-4.3p2-72.el5.ia64.rpm SHA-256: 928d3dc2d6913ae941fd2511249f5a8052433cedeb84999a72447776211ca443
openssh-clients-4.3p2-72.el5.ia64.rpm SHA-256: 947fa7eb7d813e0efa9742a0d6907f7db64ada087dcd4948f6a1cd6442c01ae6
openssh-server-4.3p2-72.el5.ia64.rpm SHA-256: 5e589c1375f3f92b984d8287679402cffa012d9fe2194487afcd3fad459751f3
i386
openssh-4.3p2-72.el5.i386.rpm SHA-256: e3ba1a67d56632b053556194d14c10777e59a49af85e3dad06a2983cdcf22c23
openssh-askpass-4.3p2-72.el5.i386.rpm SHA-256: d799a0e61d5f0e832f72d8c53ec48a89e43862122b82cb66905a250fef10f7b3
openssh-clients-4.3p2-72.el5.i386.rpm SHA-256: cac3ee40ad1c43a6adc72292d605fa341a853595bbd688dba73a3ca4e8b34c55
openssh-server-4.3p2-72.el5.i386.rpm SHA-256: 8aea1096145a9ea199bea484cec47ae28b082b8c3edb66bbe08990785f079f90

Red Hat Enterprise Linux Workstation 5

SRPM
openssh-4.3p2-72.el5.src.rpm SHA-256: 641503e849d73504a0935dd19d0a9b794df400088190cb2c55b657139fff1584
x86_64
openssh-4.3p2-72.el5.x86_64.rpm SHA-256: faac2433139ce60c01c1e4a94a71e0b1269d75614985dcbcaa2c739f71cb3ae8
openssh-askpass-4.3p2-72.el5.x86_64.rpm SHA-256: 0d3849775b345560d1542c28c3651e3070d29ab974311233396c0233298aff23
openssh-clients-4.3p2-72.el5.x86_64.rpm SHA-256: f08c820a288a3b9e27d275aba283b496a47a4694f7e13b3dc285c7e19f158f56
openssh-server-4.3p2-72.el5.x86_64.rpm SHA-256: 4e78db2e392a1ef28de7a777870d5b37e7a9842fa8ab85335a13a015a70ce77d
i386
openssh-4.3p2-72.el5.i386.rpm SHA-256: e3ba1a67d56632b053556194d14c10777e59a49af85e3dad06a2983cdcf22c23
openssh-askpass-4.3p2-72.el5.i386.rpm SHA-256: d799a0e61d5f0e832f72d8c53ec48a89e43862122b82cb66905a250fef10f7b3
openssh-clients-4.3p2-72.el5.i386.rpm SHA-256: cac3ee40ad1c43a6adc72292d605fa341a853595bbd688dba73a3ca4e8b34c55
openssh-server-4.3p2-72.el5.i386.rpm SHA-256: 8aea1096145a9ea199bea484cec47ae28b082b8c3edb66bbe08990785f079f90

Red Hat Enterprise Linux Desktop 5

SRPM
openssh-4.3p2-72.el5.src.rpm SHA-256: 641503e849d73504a0935dd19d0a9b794df400088190cb2c55b657139fff1584
x86_64
openssh-4.3p2-72.el5.x86_64.rpm SHA-256: faac2433139ce60c01c1e4a94a71e0b1269d75614985dcbcaa2c739f71cb3ae8
openssh-askpass-4.3p2-72.el5.x86_64.rpm SHA-256: 0d3849775b345560d1542c28c3651e3070d29ab974311233396c0233298aff23
openssh-clients-4.3p2-72.el5.x86_64.rpm SHA-256: f08c820a288a3b9e27d275aba283b496a47a4694f7e13b3dc285c7e19f158f56
openssh-server-4.3p2-72.el5.x86_64.rpm SHA-256: 4e78db2e392a1ef28de7a777870d5b37e7a9842fa8ab85335a13a015a70ce77d
i386
openssh-4.3p2-72.el5.i386.rpm SHA-256: e3ba1a67d56632b053556194d14c10777e59a49af85e3dad06a2983cdcf22c23
openssh-askpass-4.3p2-72.el5.i386.rpm SHA-256: d799a0e61d5f0e832f72d8c53ec48a89e43862122b82cb66905a250fef10f7b3
openssh-clients-4.3p2-72.el5.i386.rpm SHA-256: cac3ee40ad1c43a6adc72292d605fa341a853595bbd688dba73a3ca4e8b34c55
openssh-server-4.3p2-72.el5.i386.rpm SHA-256: 8aea1096145a9ea199bea484cec47ae28b082b8c3edb66bbe08990785f079f90

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
openssh-4.3p2-72.el5.src.rpm SHA-256: 641503e849d73504a0935dd19d0a9b794df400088190cb2c55b657139fff1584
s390x
openssh-4.3p2-72.el5.s390x.rpm SHA-256: e963c85d5d4ae22eb43500a1498ad5e68cb0a6ab93b81101e0c2e99265b6fc93
openssh-askpass-4.3p2-72.el5.s390x.rpm SHA-256: ab4aa475486d1edf89d37db3eb1c4508c27c68f3543a3db39fc3569c9a47e667
openssh-clients-4.3p2-72.el5.s390x.rpm SHA-256: cd8c3ec95ebd92126c17460cafcc4a4a8cfeeeb75b83f1a01bf22c7acf205525
openssh-server-4.3p2-72.el5.s390x.rpm SHA-256: da151a85e661337ac398e3bfead5ceed30e1c43007a2047d28f3dd67de4a2886

Red Hat Enterprise Linux for Power, big endian 5

SRPM
openssh-4.3p2-72.el5.src.rpm SHA-256: 641503e849d73504a0935dd19d0a9b794df400088190cb2c55b657139fff1584
ppc
openssh-4.3p2-72.el5.ppc.rpm SHA-256: 7e73727d6905ac75bd660b5f6cf9f7c41701705a32d68fce650afc675fe6ff37
openssh-askpass-4.3p2-72.el5.ppc.rpm SHA-256: 8130cb17790a9e0a7620244ff81694902d95f02374ce0de61a5efe3906610006
openssh-clients-4.3p2-72.el5.ppc.rpm SHA-256: d411ab86d4944b2cc89c333bb19029b08a1feb8b78d437c6cdbbe30a785dd957
openssh-server-4.3p2-72.el5.ppc.rpm SHA-256: be054e75dd9270b3fb3cca67ea9ab2db3b0d0b1c304b0185a179b098b4a93a06

Red Hat Enterprise Linux Server from RHUI 5

SRPM
openssh-4.3p2-72.el5.src.rpm SHA-256: 641503e849d73504a0935dd19d0a9b794df400088190cb2c55b657139fff1584
x86_64
openssh-4.3p2-72.el5.x86_64.rpm SHA-256: faac2433139ce60c01c1e4a94a71e0b1269d75614985dcbcaa2c739f71cb3ae8
openssh-askpass-4.3p2-72.el5.x86_64.rpm SHA-256: 0d3849775b345560d1542c28c3651e3070d29ab974311233396c0233298aff23
openssh-clients-4.3p2-72.el5.x86_64.rpm SHA-256: f08c820a288a3b9e27d275aba283b496a47a4694f7e13b3dc285c7e19f158f56
openssh-server-4.3p2-72.el5.x86_64.rpm SHA-256: 4e78db2e392a1ef28de7a777870d5b37e7a9842fa8ab85335a13a015a70ce77d
i386
openssh-4.3p2-72.el5.i386.rpm SHA-256: e3ba1a67d56632b053556194d14c10777e59a49af85e3dad06a2983cdcf22c23
openssh-askpass-4.3p2-72.el5.i386.rpm SHA-256: d799a0e61d5f0e832f72d8c53ec48a89e43862122b82cb66905a250fef10f7b3
openssh-clients-4.3p2-72.el5.i386.rpm SHA-256: cac3ee40ad1c43a6adc72292d605fa341a853595bbd688dba73a3ca4e8b34c55
openssh-server-4.3p2-72.el5.i386.rpm SHA-256: 8aea1096145a9ea199bea484cec47ae28b082b8c3edb66bbe08990785f079f90

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility