Date:         Fri, 9 Nov 2007 16:34:58 -0600
Reply-To:     Connie Sieh 
Sender:       Security Errata for Scientific Linux
              
From:         Connie Sieh 
Subject:      Security ERRATA for openssh on SL5.x
Comments: To: scientific 

Synopsis:          Moderate: openssh security and bug fix update

CVE Names:         CVE-2006-5052
 	           CVE-2007-3102

Problem description:

A flaw was found in the way the ssh server wrote account names to the audit
subsystem. An attacker could inject strings containing parts of audit
messages, which could possibly mislead or confuse audit log parsing tools.
(CVE-2007-3102)

A flaw was found in the way the OpenSSH server processes GSSAPI
authentication requests. When GSSAPI authentication was enabled in the
OpenSSH server, a remote attacker was potentially able to determine if a
username is valid. (CVE-2006-5052)

The following bugs in SELinux MLS (Multi-Level Security) support has also
been fixed in this update:

* It was sometimes not possible to select a SELinux role and level when
logging in using ssh.

* If the user obtained a non-default SELinux role or level, the role change
was not recorded in the audit subsystem.

* In some cases, on labeled networks, sshd allowed logins from level ranges
it should not allow.

The updated packages also contain experimental support for using private
keys stored in PKCS#11 tokens for client authentication. The support is
provided through the NSS (Network Security Services) library.

SL 5.x

SRPMS:
 	openssh-4.3p2-24.el5.src.rpm

i386:
 	openssh-4.3p2-24.el5.i386.rpm
 	openssh-askpass-4.3p2-24.el5.i386.rpm
 	openssh-clients-4.3p2-24.el5.i386.rpm
 	openssh-server-4.3p2-24.el5.i386.rpm

x86_64:
 	openssh-4.3p2-24.el5.x86_64.rpm
 	openssh-askpass-4.3p2-24.el5.x86_64.rpm
 	openssh-clients-4.3p2-24.el5.x86_64.rpm
 	openssh-server-4.3p2-24.el5.x86_64.rpm


-Connie Sieh
-Troy Dawson

SciLinux: CVE-2006-5052 openssh SL5.x

Moderate: openssh security and bug fix update

Summary

Date:         Fri, 9 Nov 2007 16:34:58 -0600Reply-To:     Connie Sieh Sender:       Security Errata for Scientific Linux              From:         Connie Sieh Subject:      Security ERRATA for openssh on SL5.xComments: To: scientific Synopsis:          Moderate: openssh security and bug fix updateCVE Names:         CVE-2006-5052 	           CVE-2007-3102Problem description:A flaw was found in the way the ssh server wrote account names to the auditsubsystem. An attacker could inject strings containing parts of auditmessages, which could possibly mislead or confuse audit log parsing tools.(CVE-2007-3102)A flaw was found in the way the OpenSSH server processes GSSAPIauthentication requests. When GSSAPI authentication was enabled in theOpenSSH server, a remote attacker was potentially able to determine if ausername is valid. (CVE-2006-5052)The following bugs in SELinux MLS (Multi-Level Security) support has alsobeen fixed in this update:* It was sometimes not possible to select a SELinux role and level whenlogging in using ssh.* If the user obtained a non-default SELinux role or level, the role changewas not recorded in the audit subsystem.* In some cases, on labeled networks, sshd allowed logins from level rangesit should not allow.The updated packages also contain experimental support for using privatekeys stored in PKCS#11 tokens for client authentication. The support isprovided through the NSS (Network Security Services) library.SL 5.xSRPMS: 	openssh-4.3p2-24.el5.src.rpmi386: 	openssh-4.3p2-24.el5.i386.rpm 	openssh-askpass-4.3p2-24.el5.i386.rpm 	openssh-clients-4.3p2-24.el5.i386.rpm 	openssh-server-4.3p2-24.el5.i386.rpmx86_64: 	openssh-4.3p2-24.el5.x86_64.rpm 	openssh-askpass-4.3p2-24.el5.x86_64.rpm 	openssh-clients-4.3p2-24.el5.x86_64.rpm 	openssh-server-4.3p2-24.el5.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News