Lucene search

K
mageiaGentoo FoundationMGASA-2016-0280
HistoryAug 31, 2016 - 6:32 p.m.

Updated openssh packages fix security vulnerability

2016-08-3118:32:33
Gentoo Foundation
advisories.mageia.org
18

0.107 Low

EPSS

Percentile

95.1%

The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable (CVE-2015-8325). When SSHD tries to authenticate a non-existing user, it will pick up a fake password structure hard-coded in the SSHD source code. An attacker can measure timing information to determine if a user exists when verifying a password (CVE-2016-6210). The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string (CVE-2016-6515). Note that CVE-2015-8325 and CVE-2016-6210 wouldn’t affect most Mageia systems, as UseLogin is not enabled by default and Mageia uses Blowfish password hashes by default.

OSVersionArchitecturePackageVersionFilename
Mageia5noarchopenssh< 6.6p1-5.9openssh-6.6p1-5.9.mga5