Lucene search

K
mageiaGentoo FoundationMGASA-2018-0006
HistoryJan 01, 2018 - 1:38 p.m.

Updated openssh packages fix security vulnerability

2018-01-0113:38:51
Gentoo Foundation
advisories.mageia.org
16

0.007 Low

EPSS

Percentile

79.5%

It was found that the boundary checks in the code implementing support for pre-authentication compression could have been optimized out by certain compilers. An attacker able to compromise the privilege-separated process could possibly use this flaw for further attacks against the privileged monitor process (CVE-2016-10012). The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files (CVE-2017-15906).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchopenssh< 6.6p1-5.10openssh-6.6p1-5.10.mga5