| Summary: | openssh new xauth command injection security issue (CVE-2016-3115) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, guillomovitch, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/679761/ | ||
| Whiteboard: | MGA5-64-OK advisory | ||
| Source RPM: | openssh-7.1p2-2.mga6.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-03-10 16:07:17 CET
David Walser
2016-03-10 16:07:42 CET
Whiteboard:
(none) =>
MGA5TOO CVE-2016-3115 has been assigned for this: http://openwall.com/lists/oss-security/2016/03/10/16 Summary:
openssh new xauth command injection security issue =>
openssh new xauth command injection security issue (CVE-2016-3115) openssh-7.2p2-1.mga6 uploaded for Cauldron by Guillaume. Thanks. Version:
Cauldron =>
5 Patched package uploaded for Mageia 5 by Guillaume. Thanks Guillaume!! Advisory: ======================== Updated openssh packages fix security vulnerability: Missing sanitisation of untrusted input allows an authenticated user who is able to request X11 forwarding to inject commands to xauth(1) (CVE-2016-3115). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115 http://www.openssh.com/txt/x11fwd.adv http://openwall.com/lists/oss-security/2016/03/10/16 ======================== Updated packages in core/updates_testing: ======================== openssh-6.6p1-5.7.mga5 openssh-clients-6.6p1-5.7.mga5 openssh-server-6.6p1-5.7.mga5 openssh-askpass-common-6.6p1-5.7.mga5 openssh-askpass-6.6p1-5.7.mga5 openssh-askpass-gnome-6.6p1-5.7.mga5 openssh-ldap-6.6p1-5.7.mga5 from openssh-6.6p1-5.7.mga5.src.rpm CC:
(none) =>
guillomovitch
Dave Hodgins
2016-03-11 00:28:53 CET
Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0108.html Status:
NEW =>
RESOLVED
David Walser
2016-03-11 16:42:12 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/679761/ |