|
|
Subscribe / Log in / New account

Mageia alert MGASA-2017-0483 (openssh)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2017-0483: Updated openssh packages fix security vulnerability
Date:  Sun, 31 Dec 2017 16:15:24 +0100
Message-ID:  <20171231151524.7B8679FD4D@duvel.mageia.org>

MGASA-2017-0483 - Updated openssh packages fix security vulnerability Publication date: 31 Dec 2017 URL: https://advisories.mageia.org/MGASA-2017-0483.html Type: security Affected Mageia releases: 6 CVE: CVE-2017-15906 Description: The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files (CVE-2017-15906). References: - https://bugs.mageia.org/show_bug.cgi?id=22104 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1... SRPMS: - 6/core/openssh-7.5p1-2.1.mga6


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds