SciLinux: CVE-2006-5052 openssh SL5.x
Summary
Date: Fri, 9 Nov 2007 16:34:58 -0600Reply-To: Connie SiehSender: Security Errata for Scientific Linux From: Connie Sieh Subject: Security ERRATA for openssh on SL5.xComments: To: scientific Synopsis: Moderate: openssh security and bug fix updateCVE Names: CVE-2006-5052 CVE-2007-3102Problem description:A flaw was found in the way the ssh server wrote account names to the auditsubsystem. An attacker could inject strings containing parts of auditmessages, which could possibly mislead or confuse audit log parsing tools.(CVE-2007-3102)A flaw was found in the way the OpenSSH server processes GSSAPIauthentication requests. When GSSAPI authentication was enabled in theOpenSSH server, a remote attacker was potentially able to determine if ausername is valid. (CVE-2006-5052)The following bugs in SELinux MLS (Multi-Level Security) support has alsobeen fixed in this update:* It was sometimes not possible to select a SELinux role and level whenlogging in using ssh.* If the user obtained a non-default SELinux role or level, the role changewas not recorded in the audit subsystem.* In some cases, on labeled networks, sshd allowed logins from level rangesit should not allow.The updated packages also contain experimental support for using privatekeys stored in PKCS#11 tokens for client authentication. The support isprovided through the NSS (Network Security Services) library.SL 5.xSRPMS: openssh-4.3p2-24.el5.src.rpmi386: openssh-4.3p2-24.el5.i386.rpm openssh-askpass-4.3p2-24.el5.i386.rpm openssh-clients-4.3p2-24.el5.i386.rpm openssh-server-4.3p2-24.el5.i386.rpmx86_64: openssh-4.3p2-24.el5.x86_64.rpm openssh-askpass-4.3p2-24.el5.x86_64.rpm openssh-clients-4.3p2-24.el5.x86_64.rpm openssh-server-4.3p2-24.el5.x86_64.rpm-Connie Sieh-Troy Dawson