Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0844 -- [Win][UNIX/Linux][RedHat] Low: openssh security update 16 November 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: openssh Publisher: Red Hat Operating System: Red Hat Enterprise Linux Desktop 4 Red Hat Enterprise Linux AS/ES/WS 4 Red Hat Desktop 3 Red Hat Enterprise Linux AS/ES/WS 3 UNIX variants (UNIX, Linux, OSX) Windows Impact: Provide Misleading Information Access: Remote/Unauthenticated CVE Names: CVE-2006-5794 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2006-0738.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running openssh check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Low: openssh security update Advisory ID: RHSA-2006:0738-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0738.html Issue date: 2006-11-15 Updated on: 2006-11-15 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5794 - - --------------------------------------------------------------------- 1. Summary: Updated openssh packages that fix an authentication flaw are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This package includes the core files necessary for both the OpenSSH client and server. An authentication flaw was found in OpenSSH's privilege separation monitor. If it ever becomes possible to alter the behavior of the unprivileged process when OpenSSH is using privilege separation, an attacker may then be able to login without possessing proper credentials. (CVE-2006-5794) Please note that this flaw by itself poses no direct threat to OpenSSH users. Without another security flaw that could allow an attacker to alter the behavior of OpenSSH's unprivileged process, this flaw cannot be exploited. There are currently no known flaws to exploit this behavior. However, we have decided to issue this erratum to fix this flaw to reduce the security impact if an unprivileged process flaw is ever found. Users of openssh should upgrade to these updated packages, which contain a backported patch to resolve this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 214640 - CVE-2006-5794 OpenSSH privilege separation flaw 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm ia64: 908a742ccbce2dc3633094328135143d openssh-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-clients-3.6.1p2-33.30.13.ia64.rpm c2101a1d81e8dbd6fa5aa66907c55df1 openssh-debuginfo-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 openssh-server-3.6.1p2-33.30.13.ia64.rpm ppc: 74d7a40819ac28ffe57b4d0358637aa5 openssh-3.6.1p2-33.30.13.ppc.rpm fb1b5891efc8fb9db26f989b48f7df9f openssh-askpass-3.6.1p2-33.30.13.ppc.rpm 30c4c779e67f9f140c1ba818d16b3389 openssh-askpass-gnome-3.6.1p2-33.30.13.ppc.rpm 42654616ea74a154c8ec943ce0c99ced openssh-clients-3.6.1p2-33.30.13.ppc.rpm 9df1c1ed2d66127bf491c531f7b3a569 openssh-debuginfo-3.6.1p2-33.30.13.ppc.rpm dfca8ed1c115ea29121a6a75852d32a7 openssh-server-3.6.1p2-33.30.13.ppc.rpm s390: 047c99c9d1f0a8302f3c0a751da3f99a openssh-3.6.1p2-33.30.13.s390.rpm 2dab72bc1e5f9f54b4e9caf201f9f617 openssh-askpass-3.6.1p2-33.30.13.s390.rpm 1dd2d0fdf4f8abf1b7fb839ff611dff1 openssh-askpass-gnome-3.6.1p2-33.30.13.s390.rpm fda4dabc8b23e7f860766f8412b7abf7 openssh-clients-3.6.1p2-33.30.13.s390.rpm 78e29572db8ea19ed2e6fd06beb00d14 openssh-debuginfo-3.6.1p2-33.30.13.s390.rpm fccc35c776978fe2654e7fbba3461dbf openssh-server-3.6.1p2-33.30.13.s390.rpm s390x: e92b4ce6f01fca8daca17c7787253ce6 openssh-3.6.1p2-33.30.13.s390x.rpm b600a2739c93ecdb6e43821d1bafe16f openssh-askpass-3.6.1p2-33.30.13.s390x.rpm 56bb8de4d2423ee720bbfea87274a40e openssh-askpass-gnome-3.6.1p2-33.30.13.s390x.rpm 5a4a37e51b6f7a0f36a698b5cc833628 openssh-clients-3.6.1p2-33.30.13.s390x.rpm efbaa975735c2e28cc9063997c78f34d openssh-debuginfo-3.6.1p2-33.30.13.s390x.rpm 518f3d002574064fe0401d724df50abd openssh-server-3.6.1p2-33.30.13.s390x.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm ia64: 908a742ccbce2dc3633094328135143d openssh-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-clients-3.6.1p2-33.30.13.ia64.rpm c2101a1d81e8dbd6fa5aa66907c55df1 openssh-debuginfo-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 openssh-server-3.6.1p2-33.30.13.ia64.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm ia64: 908a742ccbce2dc3633094328135143d openssh-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-clients-3.6.1p2-33.30.13.ia64.rpm c2101a1d81e8dbd6fa5aa66907c55df1 openssh-debuginfo-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 openssh-server-3.6.1p2-33.30.13.ia64.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm ia64: 9f7af45fa7b5a5960dae6481797df65f openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm e6d2d155030f71bc215130d697041cee openssh-debuginfo-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm ppc: 2af4e90aa5c152ab51bae154ab54d69c openssh-3.9p1-8.RHEL4.17.1.ppc.rpm b6433ae6bb5b320b16b1970aaad929b1 openssh-askpass-3.9p1-8.RHEL4.17.1.ppc.rpm 246880b444305e3e2781ae06f6b0af4b openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ppc.rpm c4cc7545bc8c4e68f9efc14cbee42069 openssh-clients-3.9p1-8.RHEL4.17.1.ppc.rpm f24ca28950dee922c9c58c8610b7c8f4 openssh-debuginfo-3.9p1-8.RHEL4.17.1.ppc.rpm 0232045e1c230a1cb37ba40f44f4ec96 openssh-server-3.9p1-8.RHEL4.17.1.ppc.rpm s390: d3ca921e20d2ed9af35eaba73baa434d openssh-3.9p1-8.RHEL4.17.1.s390.rpm 2bac8f50617955b5be6173b0b386f270 openssh-askpass-3.9p1-8.RHEL4.17.1.s390.rpm f853497e2fb1124055b4d2bede7c56de openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.s390.rpm fd1d9c9aaa84763fb1ad4d93df7da3df openssh-clients-3.9p1-8.RHEL4.17.1.s390.rpm cf451945401a2dd942bb7a697188df10 openssh-debuginfo-3.9p1-8.RHEL4.17.1.s390.rpm 81c1dfd0f611b7509e2d715e0dc005f0 openssh-server-3.9p1-8.RHEL4.17.1.s390.rpm s390x: 79767ede8be763dab8cf825dfb203374 openssh-3.9p1-8.RHEL4.17.1.s390x.rpm 1e1891b117b67d9ae272fefa96f0b2df openssh-askpass-3.9p1-8.RHEL4.17.1.s390x.rpm 5418dda31a691b7e1d86d367ae3e34cd openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.s390x.rpm f239e3313b6f50a5c75e1ffe86ecfde1 openssh-clients-3.9p1-8.RHEL4.17.1.s390x.rpm 5f2caa775daf4d32e5fafc3fe26ee3f1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.s390x.rpm 4d7d4015d1fa094b782079fcf046f887 openssh-server-3.9p1-8.RHEL4.17.1.s390x.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm ia64: 9f7af45fa7b5a5960dae6481797df65f openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm e6d2d155030f71bc215130d697041cee openssh-debuginfo-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm ia64: 9f7af45fa7b5a5960dae6481797df65f openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm e6d2d155030f71bc215130d697041cee openssh-debuginfo-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFWylWXlSAg2UNWIIRArrZAJ9gyhNfG6jBy5vKzhoHzfly2QWl1gCcC5GA aJX3No+Hlx2jlvbTWvsJmes= =ZONu - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRVvIVih9+71yA2DNAQKHGwP/SQWYQit4Ktbxl39YMnC9j3p3WijpvZNP zvMy2GXKEHBUYZI3akKT2qleTWK9uixmycEJI+h7p6IXZWUYnQ0DDGQE0JMYb5xB 3xNpxySiZSzGfQPhMhDSDZ19SrnAa11evs+TUYAZg10LiNZmtNjK3fH6Xu8chNND klA1W+x8wYg= =DxV+ -----END PGP SIGNATURE-----