- Issued:
- 2007-11-07
- Updated:
- 2007-11-07
RHSA-2007:0540 - Security Advisory
Synopsis
Moderate: openssh security and bug fix update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openssh packages that fix a security issue and various bugs are now
available.
This update has been rated as having moderate security impact by the Red Hat
Security Response Team.
Description
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.
A flaw was found in the way the ssh server wrote account names to the audit
subsystem. An attacker could inject strings containing parts of audit
messages, which could possibly mislead or confuse audit log parsing tools.
(CVE-2007-3102)
A flaw was found in the way the OpenSSH server processes GSSAPI
authentication requests. When GSSAPI authentication was enabled in the
OpenSSH server, a remote attacker was potentially able to determine if a
username is valid. (CVE-2006-5052)
The following bugs in SELinux MLS (Multi-Level Security) support has also
been fixed in this update:
- It was sometimes not possible to select a SELinux role and level when
logging in using ssh.
- If the user obtained a non-default SELinux role or level, the role change
was not recorded in the audit subsystem.
- In some cases, on labeled networks, sshd allowed logins from level ranges
it should not allow.
The updated packages also contain experimental support for using private
keys stored in PKCS#11 tokens for client authentication. The support is
provided through the NSS (Network Security Services) library.
All users of openssh should upgrade to these updated packages, which
contain patches to correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 227733 - [LSPP] unable to ssh into a system as root/auditadm_r
- BZ - 229278 - LSPP: ssh-mls allows a level through that it should not
- BZ - 231695 - LSPP: user unable to ssh to system with user/role/level context
- BZ - 234638 - CVE-2006-5052 GSSAPI information leak
- BZ - 234951 - [LSPP] openssh server fails to parse level correctly
- BZ - 248059 - CVE-2007-3102 audit logging of failed logins
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
openssh-4.3p2-24.el5.src.rpm | SHA-256: a01350015219af5fd7f6240fdee758937a62192e59243bae2db18e699d686e45 |
x86_64 | |
openssh-4.3p2-24.el5.x86_64.rpm | SHA-256: 365b767b6176c8639bb926196f24b80b7b9475c60ed59bdf8934bedf688f6a67 |
openssh-askpass-4.3p2-24.el5.x86_64.rpm | SHA-256: 956b0ec2b535ea36fce065269c5d7d9f8e0c17f992f0b1bf3591477ddfc538b2 |
openssh-clients-4.3p2-24.el5.x86_64.rpm | SHA-256: 0b5c03ec662e9a517592b6053d2180c26684c4f9c3eeaeba8996349fd353583a |
openssh-server-4.3p2-24.el5.x86_64.rpm | SHA-256: 53eab42a7e9f12540ea5ba06f1380abe53e912056d1e3eb9989ac1e7dd3ab9ce |
ia64 | |
openssh-4.3p2-24.el5.ia64.rpm | SHA-256: 4d7a29842f37444c357c868d5aec1602eb35052a1da856c048d426a5dd6fa065 |
openssh-askpass-4.3p2-24.el5.ia64.rpm | SHA-256: e8bb3a484433eb158029ca0ee5ed0f64e611060a5cc1b1e2a7e238f41420c81c |
openssh-clients-4.3p2-24.el5.ia64.rpm | SHA-256: 7b3b252b5a0620211d00d4ced781031a8964de00057578329d504468265958a5 |
openssh-server-4.3p2-24.el5.ia64.rpm | SHA-256: f95616115a724d0b9d4b0f61bed4983b2aeee42b37871d014e0f88610231351f |
i386 | |
openssh-4.3p2-24.el5.i386.rpm | SHA-256: b67ae4591288e6adc21e8c767a3a98f4227fd70e315dbb612682be03fb45c4d8 |
openssh-askpass-4.3p2-24.el5.i386.rpm | SHA-256: 8f1ee8f16d1943958e3dd2f8b406394ca4f40c16acefe6f66fc1eebb69caf9ad |
openssh-clients-4.3p2-24.el5.i386.rpm | SHA-256: d81e546b5ff225e2352823a5918b8fc2cb6aeec360acecb292c4ca71fb514929 |
openssh-server-4.3p2-24.el5.i386.rpm | SHA-256: 79fb55abad912b61fcf961d2ded3972095efb78e013e748e496f082367d34d8f |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
openssh-4.3p2-24.el5.src.rpm | SHA-256: a01350015219af5fd7f6240fdee758937a62192e59243bae2db18e699d686e45 |
x86_64 | |
openssh-4.3p2-24.el5.x86_64.rpm | SHA-256: 365b767b6176c8639bb926196f24b80b7b9475c60ed59bdf8934bedf688f6a67 |
openssh-askpass-4.3p2-24.el5.x86_64.rpm | SHA-256: 956b0ec2b535ea36fce065269c5d7d9f8e0c17f992f0b1bf3591477ddfc538b2 |
openssh-clients-4.3p2-24.el5.x86_64.rpm | SHA-256: 0b5c03ec662e9a517592b6053d2180c26684c4f9c3eeaeba8996349fd353583a |
openssh-server-4.3p2-24.el5.x86_64.rpm | SHA-256: 53eab42a7e9f12540ea5ba06f1380abe53e912056d1e3eb9989ac1e7dd3ab9ce |
i386 | |
openssh-4.3p2-24.el5.i386.rpm | SHA-256: b67ae4591288e6adc21e8c767a3a98f4227fd70e315dbb612682be03fb45c4d8 |
openssh-askpass-4.3p2-24.el5.i386.rpm | SHA-256: 8f1ee8f16d1943958e3dd2f8b406394ca4f40c16acefe6f66fc1eebb69caf9ad |
openssh-clients-4.3p2-24.el5.i386.rpm | SHA-256: d81e546b5ff225e2352823a5918b8fc2cb6aeec360acecb292c4ca71fb514929 |
openssh-server-4.3p2-24.el5.i386.rpm | SHA-256: 79fb55abad912b61fcf961d2ded3972095efb78e013e748e496f082367d34d8f |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
openssh-4.3p2-24.el5.src.rpm | SHA-256: a01350015219af5fd7f6240fdee758937a62192e59243bae2db18e699d686e45 |
x86_64 | |
openssh-4.3p2-24.el5.x86_64.rpm | SHA-256: 365b767b6176c8639bb926196f24b80b7b9475c60ed59bdf8934bedf688f6a67 |
openssh-askpass-4.3p2-24.el5.x86_64.rpm | SHA-256: 956b0ec2b535ea36fce065269c5d7d9f8e0c17f992f0b1bf3591477ddfc538b2 |
openssh-clients-4.3p2-24.el5.x86_64.rpm | SHA-256: 0b5c03ec662e9a517592b6053d2180c26684c4f9c3eeaeba8996349fd353583a |
openssh-server-4.3p2-24.el5.x86_64.rpm | SHA-256: 53eab42a7e9f12540ea5ba06f1380abe53e912056d1e3eb9989ac1e7dd3ab9ce |
i386 | |
openssh-4.3p2-24.el5.i386.rpm | SHA-256: b67ae4591288e6adc21e8c767a3a98f4227fd70e315dbb612682be03fb45c4d8 |
openssh-askpass-4.3p2-24.el5.i386.rpm | SHA-256: 8f1ee8f16d1943958e3dd2f8b406394ca4f40c16acefe6f66fc1eebb69caf9ad |
openssh-clients-4.3p2-24.el5.i386.rpm | SHA-256: d81e546b5ff225e2352823a5918b8fc2cb6aeec360acecb292c4ca71fb514929 |
openssh-server-4.3p2-24.el5.i386.rpm | SHA-256: 79fb55abad912b61fcf961d2ded3972095efb78e013e748e496f082367d34d8f |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
openssh-4.3p2-24.el5.src.rpm | SHA-256: a01350015219af5fd7f6240fdee758937a62192e59243bae2db18e699d686e45 |
s390x | |
openssh-4.3p2-24.el5.s390x.rpm | SHA-256: 1d2b338848d824d99d7d7a9a11c361459902dac005d4aaea5f2243ff04b85295 |
openssh-askpass-4.3p2-24.el5.s390x.rpm | SHA-256: 26d1058773a68b8e752c1d320604614f8d701ff2c273c4ef2ed778f906c72c9b |
openssh-clients-4.3p2-24.el5.s390x.rpm | SHA-256: f92532ef573192b4f77d852b540b97252769d15ae22dae892aac8d0541388e98 |
openssh-server-4.3p2-24.el5.s390x.rpm | SHA-256: 7d0e24685dcb8d40bf10b5d2e4b467a36df889faada439b471d6e00a547e047f |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
openssh-4.3p2-24.el5.src.rpm | SHA-256: a01350015219af5fd7f6240fdee758937a62192e59243bae2db18e699d686e45 |
ppc | |
openssh-4.3p2-24.el5.ppc.rpm | SHA-256: 81cdbb2e2a32cf0ac27bb0594eaef3943e797b33af69b5d8f12f7738add73f79 |
openssh-askpass-4.3p2-24.el5.ppc.rpm | SHA-256: e4e816a781b51a5f97574d8b847d4d4d99fe5bd676e5ee608cba4107a782c90e |
openssh-clients-4.3p2-24.el5.ppc.rpm | SHA-256: 8f0418694cc3e34a96db31babeb6d678349f700ffb0a29af363696668d62dd63 |
openssh-server-4.3p2-24.el5.ppc.rpm | SHA-256: f2d09ae03d55ef9eb94df99b9df661a8426a5d3e106cef2201fb8aed60d3b181 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
openssh-4.3p2-24.el5.src.rpm | SHA-256: a01350015219af5fd7f6240fdee758937a62192e59243bae2db18e699d686e45 |
x86_64 | |
openssh-4.3p2-24.el5.x86_64.rpm | SHA-256: 365b767b6176c8639bb926196f24b80b7b9475c60ed59bdf8934bedf688f6a67 |
openssh-askpass-4.3p2-24.el5.x86_64.rpm | SHA-256: 956b0ec2b535ea36fce065269c5d7d9f8e0c17f992f0b1bf3591477ddfc538b2 |
openssh-clients-4.3p2-24.el5.x86_64.rpm | SHA-256: 0b5c03ec662e9a517592b6053d2180c26684c4f9c3eeaeba8996349fd353583a |
openssh-server-4.3p2-24.el5.x86_64.rpm | SHA-256: 53eab42a7e9f12540ea5ba06f1380abe53e912056d1e3eb9989ac1e7dd3ab9ce |
i386 | |
openssh-4.3p2-24.el5.i386.rpm | SHA-256: b67ae4591288e6adc21e8c767a3a98f4227fd70e315dbb612682be03fb45c4d8 |
openssh-askpass-4.3p2-24.el5.i386.rpm | SHA-256: 8f1ee8f16d1943958e3dd2f8b406394ca4f40c16acefe6f66fc1eebb69caf9ad |
openssh-clients-4.3p2-24.el5.i386.rpm | SHA-256: d81e546b5ff225e2352823a5918b8fc2cb6aeec360acecb292c4ca71fb514929 |
openssh-server-4.3p2-24.el5.i386.rpm | SHA-256: 79fb55abad912b61fcf961d2ded3972095efb78e013e748e496f082367d34d8f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.