MGASA-2017-0483

Source
https://advisories.mageia.org/MGASA-2017-0483.html
Import Source
https://advisories.mageia.org/MGASA-2017-0483.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0483
Related
Published
2017-12-31T15:14:43Z
Modified
2017-12-31T14:49:49Z
Summary
Updated openssh packages fix security vulnerability
Details

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files (CVE-2017-15906).

References
Credits

Affected packages

Mageia:6 / openssh

Package

Name
openssh
Purl
pkg:rpm/mageia/openssh?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.5p1-2.1.mga6

Ecosystem specific

{
    "section": "core"
}