| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0033: libssh-0.5.2-1.2.mga2 (2/core) |
| Date: |
| Wed, 6 Feb 2013 23:15:44 +0100 |
| Message-ID: |
| <20130206221544.GA17426@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0033
Date: February 6th, 2013
Affected releases: 2
Media: Core
Description:
Updated libssh packages fix security vulnerability:
Yong Chuan Koh discovered that libssh incorrectly handled certain
negotiation requests. A remote attacker could use this to cause libssh
to crash, resulting in a denial of service (CVE-2013-0176).
Updated Packages:
i586:
libssh4-0.5.2-1.2.mga2.i586.rpm
libssh-devel-0.5.2-1.2.mga2.i586.rpm
libssh-debug-0.5.2-1.2.mga2.i586.rpm
x86_64:
lib64ssh4-0.5.2-1.2.mga2.x86_64.rpm
lib64ssh-devel-0.5.2-1.2.mga2.x86_64.rpm
libssh-debug-0.5.2-1.2.mga2.x86_64.rpm
SRPMS:
libssh-0.5.2-1.2.mga2.src.rpm
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176
http://www.libssh.org/2013/01/22/libssh-0-5-4-security-re...
http://www.ubuntu.com/usn/usn-1707-1/
https://bugs.mageia.org/show_bug.cgi?id=8880
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...
(
Log in to post comments)