SCIENTIFIC-LINUX-ERRATA Archives

March 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 25 Mar 2015 15:19:49 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (87 lines)
Synopsis:          Moderate: openssh security, bug fix and enhancement update
Advisory ID:       SLSA-2015:0425-2
Issue Date:        2015-03-05
CVE Numbers:       CVE-2014-2653
                   CVE-2014-9278
--

It was discovered that OpenSSH clients did not correctly verify DNS SSHFP
records. A malicious server could use this flaw to force a connecting
client to skip the DNS SSHFP record check and require the user to perform
manual host verification of the DNS SSHFP record. (CVE-2014-2653)

It was found that when OpenSSH was used in a Kerberos environment, remote
authenticated users were allowed to log in as a different user if they
were listed in the ~/.k5users file of that user, potentially bypassing
intended authentication restrictions. (CVE-2014-9278)

The openssh packages have been upgraded to upstream version 6.6.1, which
provides a number of bug fixes and enhancements over the previous version.

Bug fixes:

* An existing /dev/log socket is needed when logging using the syslog
utility, which is not possible for all chroot environments based on the
user's home directories. As a consequence, the sftp commands were not
logged in the chroot setup without /dev/log in the internal sftp
subsystem. With this update, openssh has been enhanced to detect whether
/dev/log exists. If /dev/log does not exist, processes in the chroot
environment use their master processes for logging.

* The buffer size for a host name was limited to 64 bytes. As a
consequence, when a host name was 64 bytes long or longer, the ssh-keygen
utility failed. The buffer size has been increased to fix this bug, and
ssh-keygen no longer fails in the described situation.

* Non-ASCII characters have been replaced by their octal representations
in banner messages in order to prevent terminal re-programming attacks.
Consequently, banners containing UTF-8 strings were not correctly
displayed in a client. With this update, banner messages are processed
according to RFC 3454, control characters have been removed, and banners
containing UTF-8 strings are now displayed correctly.

* Scientific Linux uses persistent Kerberos credential caches, which are
shared between sessions. Previously, the GSSAPICleanupCredentials option
was set to "yes" by default. Consequently, removing a Kerberos cache on
logout could remove unrelated credentials of other sessions, which could
make the system unusable. To fix this bug, GSSAPICleanupCredentials is set
by default to "no".

* Access permissions for the /etc/ssh/moduli file were set to 0600, which
was unnecessarily strict. With this update, the permissions for
/etc/ssh/moduli have been changed to 0644 to make the access to the file
easier.

* Due to the KRB5CCNAME variable being truncated, the Kerberos ticket
cache was not found after login using a Kerberos-enabled SSH connection.
The underlying source code has been modified to fix this bug, and Kerberos
authentication works as expected in the described situation.

Enhancements:

* When the sshd daemon is configured to force the internal SFTP session, a
connection other then SFTP is used, the appropriate message is logged to
the /var/log/secure file.

* The sshd-keygen service was run using the "ExecStartPre=-/usr/sbin/sshd-
keygen" option in the sshd.service unit file. With this update, the
separate sshd-keygen.service unit file has been added, and sshd.service
has been adjusted to require sshd-keygen.service.
--

SL7
  x86_64
    openssh-6.6.1p1-11.el7.x86_64.rpm
    openssh-askpass-6.6.1p1-11.el7.x86_64.rpm
    openssh-clients-6.6.1p1-11.el7.x86_64.rpm
    openssh-debuginfo-6.6.1p1-11.el7.x86_64.rpm
    openssh-keycat-6.6.1p1-11.el7.x86_64.rpm
    openssh-server-6.6.1p1-11.el7.x86_64.rpm
    openssh-debuginfo-6.6.1p1-11.el7.i686.rpm
    openssh-ldap-6.6.1p1-11.el7.x86_64.rpm
    openssh-server-sysvinit-6.6.1p1-11.el7.x86_64.rpm
    pam_ssh_agent_auth-0.9.3-9.11.el7.i686.rpm
    pam_ssh_agent_auth-0.9.3-9.11.el7.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2