MGASA-2015-0209

Source
https://advisories.mageia.org/MGASA-2015-0209.html
Import Source
https://advisories.mageia.org/MGASA-2015-0209.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0209
Related
Published
2015-05-11T20:10:38Z
Modified
2016-03-07T22:46:41Z
Summary
Updated libssh packages fix CVE-2015-3146
Details

Updated libssh packages fix security vulnerability:

libssh versions 0.5.1 and above, but before 0.6.5, have a logical error in the handling of a SSHMSGNEWKEYS and SSHMSGKEXDH_REPLY package. A detected error did not set the session into the error state correctly and further processed the packet which leads to a null pointer dereference. This is the packet after the initial key exchange and doesn't require authentication. This could be used for a Denial of Service (DoS) attack (CVE-2015-3146).

References
Credits

Affected packages

Mageia:4 / libssh

Package

Name
libssh
Purl
pkg:rpm/mageia/libssh?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.5-2.3.mga4

Ecosystem specific

{
    "section": "core"
}