-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2015.2866.2
        Moderate: openssh security, bug fix, and enhancement update
                             23 November 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openssh
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
Impact/Access:     Root Compromise  -- Existing Account      
                   Reduced Security -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-6564 CVE-2015-6563 CVE-2015-5600

Reference:         ASB-2015.0090

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2015-2088.html

Revision History:  November 23 2015: Correction to product name
                   November 20 2015: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: openssh security, bug fix, and enhancement update
Advisory ID:       RHSA-2015:2088-06
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2015-2088.html
Issue date:        2015-11-19
CVE Names:         CVE-2015-5600 CVE-2015-6563 CVE-2015-6564 
=====================================================================

1. Summary:

Updated openssh packages that fix multiple security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise
Linux 7.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.

A flaw was found in the way OpenSSH handled PAM authentication when using
privilege separation. An attacker with valid credentials on the system and
able to fully compromise a non-privileged pre-authentication process using
a different flaw could use this flaw to authenticate as other users.
(CVE-2015-6563)

A use-after-free flaw was found in OpenSSH. An attacker able to fully
compromise a non-privileged pre-authentication process using a different
flaw could possibly cause sshd to crash or execute arbitrary code with
root privileges. (CVE-2015-6564)

It was discovered that the OpenSSH sshd daemon did not check the list of
keyboard-interactive authentication methods for duplicates. A remote
attacker could use this flaw to bypass the MaxAuthTries limit, making it
easier to perform password guessing attacks. (CVE-2015-5600)

It was found that the OpenSSH ssh-agent, a program to hold private keys
used for public key authentication, was vulnerable to password guessing
attacks. An attacker able to connect to the agent could use this flaw to
conduct a brute-force attack to unlock keys in the ssh-agent. (BZ#1238238)

This update fixes the following bugs:

* Previously, the sshd_config(5) man page was misleading and could thus
confuse the user. This update improves the man page text to clearly
describe the AllowGroups feature. (BZ#1150007)

* The limit for the function for restricting the number of files listed
using the wildcard character (*) that prevents the Denial of Service (DoS)
for both server and client was previously set too low. Consequently, the
user reaching the limit was prevented from listing a directory with a large
number of files over Secure File Transfer Protocol (SFTP). This update
increases the aforementioned limit, thus fixing this bug. (BZ#1160377)

* When the ForceCommand option with a pseudoterminal was used and the
MaxSession option was set to "2", multiplexed SSH connections did not work
as expected. After the user attempted to open a second multiplexed
connection, the attempt failed if the first connection was still open. This
update modifies OpenSSH to issue only one audit message per session, and
the user is thus able to open two multiplexed connections in this
situation. (BZ#1199112)

* The ssh-copy-id utility failed if the account on the remote server did
not use an sh-like shell. Remote commands have been modified to run in an
sh-like shell, and ssh-copy-id now works also with non-sh-like shells.
(BZ#1201758)

* Due to a race condition between auditing messages and answers when using
ControlMaster multiplexing, one session in the shared connection randomly
and unexpectedly exited the connection. This update fixes the race
condition in the auditing code, and multiplexing connections now work as
expected even with a number of sessions created at once. (BZ#1240613)

In addition, this update adds the following enhancements:

* As not all Lightweight Directory Access Protocol (LDAP) servers possess
a default schema, as expected by the ssh-ldap-helper program, this update
provides the user with an ability to adjust the LDAP query to get public
keys from servers with a different schema, while the default functionality
stays untouched. (BZ#1201753)

* With this enhancement update, the administrator is able to set
permissions for files uploaded using Secure File Transfer Protocol (SFTP).
(BZ#1197989)

* This update provides the LDAP schema in LDAP Data Interchange Format
(LDIF) format as a complement to the old schema previously accepted
by OpenLDAP. (BZ#1184938)

* With this update, the user can selectively disable the Generic Security
Services API (GSSAPI) key exchange algorithms as any normal key exchange.
(BZ#1253062)

Users of openssh are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1125110 - pam_namespace usage is not consistent across system-wide PAM configuration
1160377 - sftp is failing using wildcards and many files
1178116 - Default selinux policy prevents ssh-ldap-helper from connecting to LDAP server
1181591 - No Documentation= line in the sshd.service file
1184938 - Provide LDIF version of LPK schema
1187597 - sshd -T does not show all (default) options, inconsistency
1197666 - ssh client using HostbasedAuthentication aborts in FIPS mode
1197989 - RFE: option to let openssh/sftp force the exact permissions on newly uploaded files
1238238 - openssh: weakness of agent locking (ssh-add -x) to password guessing
1245969 - CVE-2015-5600 openssh: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices
1252844 - CVE-2015-6563 openssh: Privilege separation weakness related to PAM support
1252852 - CVE-2015-6564 openssh: Use-after-free bug related to PAM support

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
openssh-6.6.1p1-22.el7.src.rpm

x86_64:
openssh-6.6.1p1-22.el7.x86_64.rpm
openssh-askpass-6.6.1p1-22.el7.x86_64.rpm
openssh-clients-6.6.1p1-22.el7.x86_64.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-keycat-6.6.1p1-22.el7.x86_64.rpm
openssh-server-6.6.1p1-22.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
openssh-debuginfo-6.6.1p1-22.el7.i686.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-ldap-6.6.1p1-22.el7.x86_64.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.x86_64.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.i686.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
openssh-6.6.1p1-22.el7.src.rpm

x86_64:
openssh-6.6.1p1-22.el7.x86_64.rpm
openssh-clients-6.6.1p1-22.el7.x86_64.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-keycat-6.6.1p1-22.el7.x86_64.rpm
openssh-server-6.6.1p1-22.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
openssh-askpass-6.6.1p1-22.el7.x86_64.rpm
openssh-debuginfo-6.6.1p1-22.el7.i686.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-ldap-6.6.1p1-22.el7.x86_64.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.x86_64.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.i686.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
openssh-6.6.1p1-22.el7.src.rpm

aarch64:
openssh-6.6.1p1-22.el7.aarch64.rpm
openssh-clients-6.6.1p1-22.el7.aarch64.rpm
openssh-debuginfo-6.6.1p1-22.el7.aarch64.rpm
openssh-keycat-6.6.1p1-22.el7.aarch64.rpm
openssh-server-6.6.1p1-22.el7.aarch64.rpm

ppc64:
openssh-6.6.1p1-22.el7.ppc64.rpm
openssh-askpass-6.6.1p1-22.el7.ppc64.rpm
openssh-clients-6.6.1p1-22.el7.ppc64.rpm
openssh-debuginfo-6.6.1p1-22.el7.ppc64.rpm
openssh-keycat-6.6.1p1-22.el7.ppc64.rpm
openssh-server-6.6.1p1-22.el7.ppc64.rpm

ppc64le:
openssh-6.6.1p1-22.el7.ppc64le.rpm
openssh-askpass-6.6.1p1-22.el7.ppc64le.rpm
openssh-clients-6.6.1p1-22.el7.ppc64le.rpm
openssh-debuginfo-6.6.1p1-22.el7.ppc64le.rpm
openssh-keycat-6.6.1p1-22.el7.ppc64le.rpm
openssh-server-6.6.1p1-22.el7.ppc64le.rpm

s390x:
openssh-6.6.1p1-22.el7.s390x.rpm
openssh-askpass-6.6.1p1-22.el7.s390x.rpm
openssh-clients-6.6.1p1-22.el7.s390x.rpm
openssh-debuginfo-6.6.1p1-22.el7.s390x.rpm
openssh-keycat-6.6.1p1-22.el7.s390x.rpm
openssh-server-6.6.1p1-22.el7.s390x.rpm

x86_64:
openssh-6.6.1p1-22.el7.x86_64.rpm
openssh-askpass-6.6.1p1-22.el7.x86_64.rpm
openssh-clients-6.6.1p1-22.el7.x86_64.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-keycat-6.6.1p1-22.el7.x86_64.rpm
openssh-server-6.6.1p1-22.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

aarch64:
openssh-askpass-6.6.1p1-22.el7.aarch64.rpm
openssh-debuginfo-6.6.1p1-22.el7.aarch64.rpm
openssh-ldap-6.6.1p1-22.el7.aarch64.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.aarch64.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.aarch64.rpm

ppc64:
openssh-debuginfo-6.6.1p1-22.el7.ppc.rpm
openssh-debuginfo-6.6.1p1-22.el7.ppc64.rpm
openssh-ldap-6.6.1p1-22.el7.ppc64.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.ppc64.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.ppc.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.ppc64.rpm

ppc64le:
openssh-debuginfo-6.6.1p1-22.el7.ppc64le.rpm
openssh-ldap-6.6.1p1-22.el7.ppc64le.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.ppc64le.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.ppc64le.rpm

s390x:
openssh-debuginfo-6.6.1p1-22.el7.s390.rpm
openssh-debuginfo-6.6.1p1-22.el7.s390x.rpm
openssh-ldap-6.6.1p1-22.el7.s390x.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.s390x.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.s390.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.s390x.rpm

x86_64:
openssh-debuginfo-6.6.1p1-22.el7.i686.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-ldap-6.6.1p1-22.el7.x86_64.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.x86_64.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.i686.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
openssh-6.6.1p1-22.el7.src.rpm

x86_64:
openssh-6.6.1p1-22.el7.x86_64.rpm
openssh-askpass-6.6.1p1-22.el7.x86_64.rpm
openssh-clients-6.6.1p1-22.el7.x86_64.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-keycat-6.6.1p1-22.el7.x86_64.rpm
openssh-server-6.6.1p1-22.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
openssh-debuginfo-6.6.1p1-22.el7.i686.rpm
openssh-debuginfo-6.6.1p1-22.el7.x86_64.rpm
openssh-ldap-6.6.1p1-22.el7.x86_64.rpm
openssh-server-sysvinit-6.6.1p1-22.el7.x86_64.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.i686.rpm
pam_ssh_agent_auth-0.9.3-9.22.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-5600
https://access.redhat.com/security/cve/CVE-2015-6563
https://access.redhat.com/security/cve/CVE-2015-6564
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFWTj/BXlSAg2UNWIIRAgIEAJ4+Nlu4NsYtiDloNVrVn2F/vT/9kACdEHqE
h3XwDOy3+OSs/h1DEpVBtV0=
=x/s+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=aHB/
-----END PGP SIGNATURE-----