ALT-BU-2018-3530-1
Branch c7.1 update bulletin.
Closed vulnerabilities
BDU:2018-01221
Уязвимость механизма аутентификации серверной части библиотеки libssh, позволяющая нарушителю обойти процедуру аутентификации
Modified: 2024-11-21
CVE-2014-8132
Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
- http://advisories.mageia.org/MGASA-2015-0014.html
- http://advisories.mageia.org/MGASA-2015-0014.html
- FEDORA-2014-17354
- FEDORA-2014-17354
- FEDORA-2014-17303
- FEDORA-2014-17303
- FEDORA-2014-17324
- FEDORA-2014-17324
- openSUSE-SU-2015:0017
- openSUSE-SU-2015:0017
- 60838
- 60838
- DSA-3488
- DSA-3488
- http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/
- http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/
- MDVSA-2015:020
- MDVSA-2015:020
- USN-2478-1
- USN-2478-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1158089
- https://bugzilla.redhat.com/show_bug.cgi?id=1158089
- GLSA-201606-12
- GLSA-201606-12
Modified: 2024-11-21
CVE-2015-3146
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
- FEDORA-2015-10962
- FEDORA-2015-10962
- FEDORA-2015-7590
- FEDORA-2015-7590
- DSA-3488
- DSA-3488
- USN-2912-1
- USN-2912-1
- https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f
- https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f
- https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/
- https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2015-3146.txt
- https://www.libssh.org/security/advisories/CVE-2015-3146.txt
Modified: 2024-11-21
CVE-2016-0739
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
- FEDORA-2016-d9f950c779
- FEDORA-2016-d9f950c779
- FEDORA-2016-dc9e8da03c
- FEDORA-2016-dc9e8da03c
- openSUSE-SU-2016:0880
- openSUSE-SU-2016:0880
- RHSA-2016:0566
- RHSA-2016:0566
- DSA-3488
- DSA-3488
- USN-2912-1
- USN-2912-1
- https://puppet.com/security/cve/CVE-2016-0739
- https://puppet.com/security/cve/CVE-2016-0739
- GLSA-201606-12
- GLSA-201606-12
- https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
- https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2016-0739.txt
- https://www.libssh.org/security/advisories/CVE-2016-0739.txt
Modified: 2024-11-21
CVE-2018-10933
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
- 105677
- 105677
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
- [debian-lts-announce] 20181018 [SECURITY] [DLA 1548-1] libssh security update
- [debian-lts-announce] 20181018 [SECURITY] [DLA 1548-1] libssh security update
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://security.netapp.com/advisory/ntap-20190118-0002/
- USN-3795-1
- USN-3795-1
- USN-3795-2
- USN-3795-2
- DSA-4322
- DSA-4322
- 45638
- 45638
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html