Mageia 2019-0043: libssh security update
Summary
libssh versions 0.6 and above have an authentication bypass
vulnerability in the server code. By presenting the server an
SSH2_MSG_USERAUTH_SUCCESS message in place of the
SSH2_MSG_USERAUTH_REQUEST message which the server would expect to
initiate authentication, the attacker could successfully authentciate
without any credentials (CVE-2018-10933).
References
- https://bugs.mageia.org/show_bug.cgi?id=23711
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10933
Resolution
MGASA-2019-0043 - Updated libssh packages fix security vulnerability
SRPMS
- 6/core/libssh-0.7.7-1.mga6