Bug 207957 (CVE-2006-4924)

Summary: CVE-2006-4924 openssh DoS
Product: [Fedora] Fedora Reporter: Josh Bressers <bressers>
Component: opensshAssignee: Tomas Mraz <tmraz>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 5CC: deisenst
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: reported=20060919,public=20060919,source=vendorsec,impact=moderate
Fixed In Version: openssh-4.3p2-4.10 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-10-06 03:08:31 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Description Josh Bressers 2006-09-25 11:37:25 EDT
+++ This bug was initially created as a clone of Bug #207955 +++

Tavis Ormandy of the Google Security Team discovered a denial of service attack
on the openssh sshd daemon when ssh protocol version 1 is enabled.  This flaw
will cause the openssh server to consume a large quantity of the CPU until the
specified timeout is reached.

The upstream patches can be found here:
Comment 1 Fedora Update System 2006-10-03 16:02:15 EDT
openssh-4.3p2-4.10 has been pushed for fc5, which should resolve this issue.  If these problems are still present in this version, then please make note of it in this bug report.
Comment 2 David Eisenstein 2006-10-06 03:08:31 EDT
Hrm.  If this issue is resolved, then shouldn't this bug report be closed
by the Fedora Updates System?

Anyhoo, the resolution is Fedora Update Notification "FEDORA-2006-1011",
posted at:

Closing this bug.  (If I am wrong to close this bug, please let me know?)