Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 109678 - net-misc/openssh: Information disclosure in GSSAPI auth
Summary: net-misc/openssh: Information disclosure in GSSAPI auth
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://www.mindrot.org/pipermail/open...
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2005-10-18 00:48 UTC by Thierry Carrez (RETIRED)
Modified: 2006-11-11 19:23 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thierry Carrez (RETIRED) gentoo-dev 2005-10-18 00:48:24 UTC
Not sure we handled this one :

CAN-2005-2798
===========================================================

An information disclosure vulnerability has been found in the SSH
server. When the GSSAPIAuthentication option was enabled, the SSH
server could send GSSAPI credentials even to users who attempted to
log in with a method other than GSSAPI. This could inadvertently
expose these credentials to an untrusted user.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-10-19 11:41:27 UTC
This is fixed in 4.2, see the release notes :

  - SECURITY: sshd in OpenSSH versions prior to 4.2 allow GSSAPI 
    credentials to be delegated to users who log in with methods 
    other than GSSAPI authentication (e.g. public key) when the 
    client requests it. This behaviour has been changed in OpenSSH 
    4.2 to only delegate credentials to users who authenticate
    using the GSSAPI method. This eliminates the risk of credentials 
    being inadvertently exposed to an untrusted user/host (though 
    users should not activate GSSAPIDelegateCredentials to begin
    with when the remote user or host is untrusted)

Can we mark 4.2 stable or is it too soon ?
Comment 2 SpanKY gentoo-dev 2005-10-19 12:09:18 UTC
i'm not aware of any open issues that exist in openssh-4.2_p1 that dont already
exist in the current stable

so afaict, moving to 4.2_p1 should be safe
Comment 3 Thierry Carrez (RETIRED) gentoo-dev 2005-10-20 08:23:17 UTC
ok then, lets do it, target is 4.2_p1
Target KEYWORDS="alpha amd64 arm hppa ia64 mips ppc ppc64 s390 sh sparc x86"

Comment 4 Brent Baude (RETIRED) gentoo-dev 2005-10-20 11:43:03 UTC
Marked ppc64 stable
Comment 5 Marcin Kryczek (RETIRED) gentoo-dev 2005-10-20 11:57:18 UTC
x86 done 
Comment 6 Michael Hanselmann (hansmi) (RETIRED) gentoo-dev 2005-10-20 12:01:18 UTC
Stable on ppc and hppa.
Comment 7 Aaron Walker (RETIRED) gentoo-dev 2005-10-20 17:44:18 UTC
Stable on mips.
Comment 8 Seemant Kulleen (RETIRED) gentoo-dev 2005-10-21 04:34:58 UTC
amd64 stable
Comment 9 Jason Wever (RETIRED) gentoo-dev 2005-10-21 13:21:01 UTC
SPARC'd
Comment 10 Bryan Østergaard (RETIRED) gentoo-dev 2005-10-21 14:11:11 UTC
Stable on alpha + ia64.
Comment 11 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-10-21 23:57:44 UTC
This one is ready for GLSA vote. I tend to vote yes. 
Comment 12 Thierry Carrez (RETIRED) gentoo-dev 2005-10-22 06:02:08 UTC
"users should not activate GSSAPIDelegateCredentials to begin with when the
remote user or host is untrusted" --> I tend to vote no.
Comment 13 MATSUU Takuto (RETIRED) gentoo-dev 2005-10-22 06:23:26 UTC
stable on sh
Comment 14 Tavis Ormandy (RETIRED) gentoo-dev 2005-10-25 06:00:33 UTC
Agree with koon, vote NO.
Comment 15 Stefan Cornelius (RETIRED) gentoo-dev 2005-10-25 06:01:18 UTC
I'd say no here
Comment 16 Thierry Carrez (RETIRED) gentoo-dev 2005-10-25 06:12:44 UTC
Closing then
Comment 17 SpanKY gentoo-dev 2005-10-25 06:35:54 UTC
did any other distro send out notification ?
Comment 18 Thierry Carrez (RETIRED) gentoo-dev 2005-10-25 06:51:31 UTC
SpanKY: most of them did.
Ubuntu USN-208-1
Mandrake MDKSA-2005:172
redHat RHSA-2005:527-01

Feel free to reopen if you disagree, if possible explaining how the
GSSAPIDelegateCredentials works, maybe it's more serious than we think...