[RHSA-2023:6643] libssh security update
Severity
Moderate
Affected Packages
11
CVEs
2
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667)
libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/libssh?arch=x86_64&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh?arch=s390x&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh?arch=ppc64le&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh?arch=i686&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh?arch=aarch64&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh-devel?arch=x86_64&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh-devel?arch=s390x&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh-devel?arch=ppc64le&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh-devel?arch=i686&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh-devel?arch=aarch64&distro=redhat-9 | < 0.10.4-11.el9 |
pkg:rpm/redhat/libssh-config?distro=redhat-9 | < 0.10.4-11.el9 |
- ID
- RHSA-2023:6643
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2023:6643
- Published
-
2023-11-07T00:00:00
(10 months ago) - Modified
-
2023-11-07T00:00:00
(10 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2182199 | https://bugzilla.redhat.com/2182199 | |
Bugzilla | 2189736 | https://bugzilla.redhat.com/2189736 | |
RHSA | RHSA-2023:6643 | https://access.redhat.com/errata/RHSA-2023:6643 | |
CVE | CVE-2023-1667 | https://access.redhat.com/security/cve/CVE-2023-1667 | |
CVE | CVE-2023-2283 | https://access.redhat.com/security/cve/CVE-2023-2283 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/libssh?arch=x86_64&distro=redhat-9 | redhat | libssh | < 0.10.4-11.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/libssh?arch=s390x&distro=redhat-9 | redhat | libssh | < 0.10.4-11.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/libssh?arch=ppc64le&distro=redhat-9 | redhat | libssh | < 0.10.4-11.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/libssh?arch=i686&distro=redhat-9 | redhat | libssh | < 0.10.4-11.el9 | redhat-9 | i686 | |
Affected | pkg:rpm/redhat/libssh?arch=aarch64&distro=redhat-9 | redhat | libssh | < 0.10.4-11.el9 | redhat-9 | aarch64 | |
Affected | pkg:rpm/redhat/libssh-devel?arch=x86_64&distro=redhat-9 | redhat | libssh-devel | < 0.10.4-11.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/libssh-devel?arch=s390x&distro=redhat-9 | redhat | libssh-devel | < 0.10.4-11.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/libssh-devel?arch=ppc64le&distro=redhat-9 | redhat | libssh-devel | < 0.10.4-11.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/libssh-devel?arch=i686&distro=redhat-9 | redhat | libssh-devel | < 0.10.4-11.el9 | redhat-9 | i686 | |
Affected | pkg:rpm/redhat/libssh-devel?arch=aarch64&distro=redhat-9 | redhat | libssh-devel | < 0.10.4-11.el9 | redhat-9 | aarch64 | |
Affected | pkg:rpm/redhat/libssh-config?distro=redhat-9 | redhat | libssh-config | < 0.10.4-11.el9 | redhat-9 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |