Hi,
Reply-To: Salvatore Bonaccorso <[email protected]>, [email protected]
Resent-From: Salvatore Bonaccorso <[email protected]>
Resent-To: [email protected]
Resent-CC: [email protected], [email protected], 
[email protected], Laurent Bigonville 
<[email protected]>
X-Loop: [email protected]
Resent-Date: Wed, 06 May 2015 04:57:01 +0000
Resent-Message-ID: <[email protected]>
Resent-Sender: [email protected]
X-Debian-PR-Message: report 784404
X-Debian-PR-Package: src:libssh
X-Debian-PR-Keywords: fixed-upstream security upstream
X-Debian-PR-Source: libssh
Received: via spool by [email protected] id=B.14308881018304
          (code B); Wed, 06 May 2015 04:57:01 +0000
Received: (at submit) by bugs.debian.org; 6 May 2015 04:55:01 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.0-bugs.debian.org_2005_01_02
        (2014-02-07) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=4.0 tests=BAYES_00,FROMDEVELOPER,PUSSY,
        
RCVD_IN_PBL,RCVD_IN_SORBS_DUL,RDNS_DYNAMIC,XMAILER_REPORTBUG,X_DEBBUGS_CC
        autolearn=ham autolearn_force=no 
version=3.4.0-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 17; hammy, 103; neutral, 32; spammy,
        1. spammytokens:0.957-+--H*r:bugs.debian.org
        hammytokens:0.000-+--H*F:U*carnil, 0.000-+--H*M:reportbug,
        0.000-+--H*MI:reportbug, 0.000-+--H*x:reportbug, 0.000-+--H*UA:reportbug
Received: from 84-75-170-174.dclient.hispeed.ch ([84.75.170.174] 
helo=eldamar.local)
        by buxtehude.debian.org with esmtp (Exim 4.80)
        (envelope-from <[email protected]>)
        id 1YprML-00029j-0P
        for [email protected]; Wed, 06 May 2015 04:55:01 +0000
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Salvatore Bonaccorso <[email protected]>
To: Debian Bug Tracking System <[email protected]>
Message-ID: <[email protected]>
X-Mailer: reportbug 6.6.3
Date: Wed, 06 May 2015 06:54:58 +0200
Delivered-To: [email protected]

Source: libssh
Version: 0.5.4-1
Severity: important
Tags: security upstream fixed-upstream

the following vulnerability was published for libssh.

CVE-2015-3146[0]:
| null pointer dereference due to a logical error in the handling of a
| SSH_MSG_NEWKEYS and KEXDH_REPLY packets

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-3146
[1] https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to