Bug 208349

Summary: CVE-2006-5052 GSSAPI information leak
Product: Red Hat Enterprise Linux 5 Reporter: Mark J. Cox <mjc>
Component: opensshAssignee: Miloslav Trmač <mitr>
Status: CLOSED DUPLICATE QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 5.0Keywords: Reopened, Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: reported=20060928,source=vendorsec,impact=low,public=20060928
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-03-30 19:52:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2006-09-27 22:44:31 UTC
OpenSSH 4.4 was released and mentions:

        * On portable OpenSSH, fix a GSSAPI authentication abort that
        could be used to determine the validity of usernames on some
        platforms.

This could only affect RHEL4 as previous RHEL did not support GSSAPI

(We currently don't know if this would affect Linux)

Comment 1 Miloslav Trmač 2007-03-30 19:13:21 UTC
openssh-3.9p1 is not vulnerable to this abort - but see #234643.

Comment 2 Josh Bressers 2007-03-30 19:26:38 UTC
This flaw does affect RHEL5 is seems.  I'm reopening this bug against RHEL5.

Comment 4 Josh Bressers 2007-03-30 19:52:18 UTC

*** This bug has been marked as a duplicate of 234643 ***