Summary: | <net-libs/libssh2-1.5.0: Using SSH_MSG_KEXINIT data unbounded (CVE-2015-1782) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | netmon |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.libssh2.org/adv_20150311.html | ||
Whiteboard: | B3 [noglsa/cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Arch teams, please test and mark stable: =net-libs/libssh2-1.5.0 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 Stable for HPPA. amd64 stable x86 stable ia64 stable ppc stable ppc64 stable arm stable CVE-2015-1782 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1782): The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet. sparc stable alpha stable. Maintainer(s), please cleanup. Security, please vote. Arches and Maintainer(s), Thank you for your work. GLSA Vote: Yes GLSA vote: No Client DoS => NO, closing. Thanks everyone. |