Upstream has released version 0.6.5 on April 30, fixing a security issue: https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/ They also made a patch available for 0.5.5. Update checked into Cauldron SVN. Freeze push requested. Patch checked into Mageia 4 SVN. Reproducible: Steps to Reproduce:
Blocks: (none) => 14674Whiteboard: (none) => MGA5TOO, MGA4TOO
Patched package uploaded for Mageia 4. Testing procedure (please note that openssh does *not* use this): https://bugs.mageia.org/show_bug.cgi?id=8880#c2 Advisory: ======================== Updated libssh packages fix security vulnerability: libssh versions 0.5.1 and above, but before 0.6.5, have a logical error in the handling of a SSH_MSG_NEWKEYS and SSH_MSG_KEXDH_REPLY package. A detected error did not set the session into the error state correctly and further processed the packet which leads to a null pointer dereference. This is the packet after the initial key exchange and doesnât require authentication. This could be used for a Denial of Service (DoS) attack (CVE-2015-3146). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3146 https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/ ======================== Updated packages in core/updates_testing: ======================== libssh4-0.5.5-2.3.mga4 libssh-devel-0.5.5-2.3.mga4 from libssh-0.5.5-2.3.mga4.src.rpm
Version: Cauldron => 4Blocks: 14674 => (none)Assignee: bugsquad => qa-bugsWhiteboard: MGA5TOO, MGA4TOO => (none)
kio_sftp also uses this (sftp:/ protocol in Konqueror).
kio_sftp is really neat. Very straightforward to use: http://blog.cynapses.org/2009/07/24/kio_sftp-in-action/ Tested OK Mageia 4 i586.
Whiteboard: (none) => has_procedure MGA4-32-OK
Tested OK Mageia 4 x86-64 using hydra and kio_sftp. Updating is fine.
CC: (none) => shlomifWhiteboard: has_procedure MGA4-32-OK => MGA4-64-OK has_procedure MGA4-32-OK
Validating. Advisory uploaded. Please push to 4 updates Thanks
Keywords: (none) => validated_updateWhiteboard: MGA4-64-OK has_procedure MGA4-32-OK => has_procedure advisory MGA4-32-OK MGA4-64-OKCC: (none) => sysadmin-bugs
An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0209.html
Status: NEW => RESOLVEDResolution: (none) => FIXED
URL: (none) => http://lwn.net/Vulnerabilities/644038/