Subject: | |
From: | |
Reply To: | |
Date: | Fri, 9 Nov 2007 16:34:58 -0600 |
Content-Type: | TEXT/PLAIN |
Parts/Attachments: |
|
|
Synopsis: Moderate: openssh security and bug fix update
CVE Names: CVE-2006-5052
CVE-2007-3102
Problem description:
A flaw was found in the way the ssh server wrote account names to the audit
subsystem. An attacker could inject strings containing parts of audit
messages, which could possibly mislead or confuse audit log parsing tools.
(CVE-2007-3102)
A flaw was found in the way the OpenSSH server processes GSSAPI
authentication requests. When GSSAPI authentication was enabled in the
OpenSSH server, a remote attacker was potentially able to determine if a
username is valid. (CVE-2006-5052)
The following bugs in SELinux MLS (Multi-Level Security) support has also
been fixed in this update:
* It was sometimes not possible to select a SELinux role and level when
logging in using ssh.
* If the user obtained a non-default SELinux role or level, the role change
was not recorded in the audit subsystem.
* In some cases, on labeled networks, sshd allowed logins from level ranges
it should not allow.
The updated packages also contain experimental support for using private
keys stored in PKCS#11 tokens for client authentication. The support is
provided through the NSS (Network Security Services) library.
SL 5.x
SRPMS:
openssh-4.3p2-24.el5.src.rpm
i386:
openssh-4.3p2-24.el5.i386.rpm
openssh-askpass-4.3p2-24.el5.i386.rpm
openssh-clients-4.3p2-24.el5.i386.rpm
openssh-server-4.3p2-24.el5.i386.rpm
x86_64:
openssh-4.3p2-24.el5.x86_64.rpm
openssh-askpass-4.3p2-24.el5.x86_64.rpm
openssh-clients-4.3p2-24.el5.x86_64.rpm
openssh-server-4.3p2-24.el5.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|