|
|
Log in / Subscribe / Register

Mageia alert MGASA-2015-0107 (libssh2)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0107: Updated libssh2 packages fix CVE-2015-1782
Date:  Thu, 12 Mar 2015 16:31:16 +0100
Message-ID:  <20150312153117.13E40406DD@valstar.mageia.org>

MGASA-2015-0107 - Updated libssh2 packages fix CVE-2015-1782 Publication date: 12 Mar 2015 URL: http://advisories.mageia.org/MGASA-2015-0107.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-1782 Description: Updated libssh2 packages fix security vulnerability: Mariusz Ziulek reported that libssh2, a SSH2 client-side library, was reading and using the SSH_MSG_KEXINIT packet without doing sufficient range checks when negotiating a new SSH session with a remote server. A malicious attacker could man in the middle a real server and cause a client using the libssh2 library to crash (denial of service) or otherwise read and use unintended memory areas in this process (CVE-2015-1782). References: - https://bugs.mageia.org/show_bug.cgi?id=15470 - http://www.libssh2.org/adv_20150311.html - https://www.debian.org/security/2015/dsa-3182 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782 SRPMS: - 4/core/libssh2-1.4.3-3.1.mga4


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds