Bug 234640

Summary: CVE-2006-5052 GSSAPI information leak
Product: [Fedora] Fedora Reporter: Miloslav Trmač <mitr>
Component: opensshAssignee: Miloslav Trmač <mitr>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 6Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: reported=20060928,source=vendorsec,impact=low,public=20060928
Fixed In Version: 4.3p2-19 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-04-04 06:49:13 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Attachments:
Description Flags
Backport of a patch from 4.4.p1 none

Description Miloslav Trmač 2007-03-30 14:57:48 EDT
OpenSSH 4.4 was released and mentions:

        * On portable OpenSSH, fix a GSSAPI authentication abort that
        could be used to determine the validity of usernames on some
        platforms.

Affects FC[56].
Comment 1 Miloslav Trmač 2007-03-30 14:57:48 EDT
Created attachment 151319 [details]
Backport of a patch from 4.4.p1
Comment 2 Fedora Update System 2007-03-31 10:40:16 EDT
openssh-4.3p2-19.fc6 has been pushed for fc6, which should resolve this issue.  If these problems are still present in this version, then please make note of it in this bug report.
Comment 3 Fedora Update System 2007-04-03 17:38:19 EDT
openssh-4.3p2-19.fc6 has been pushed for fc6, which should resolve this issue.  If these problems are still present in this version, then please make note of it in this bug report.