[RHSA-2024:1130] openssh security update

Severity Moderate
Affected Packages 24
CVEs 2

OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

  • ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)

  • openssh: potential command injection via shell metacharacters (CVE-2023-51385)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Package Affected Version
pkg:rpm/redhat/pam_ssh_agent_auth?arch=x86_64&distro=redhat-9.3 < 0.10.4-5.34.el9_3.3
pkg:rpm/redhat/pam_ssh_agent_auth?arch=s390x&distro=redhat-9.3 < 0.10.4-5.34.el9_3.3
pkg:rpm/redhat/pam_ssh_agent_auth?arch=ppc64le&distro=redhat-9.3 < 0.10.4-5.34.el9_3.3
pkg:rpm/redhat/pam_ssh_agent_auth?arch=aarch64&distro=redhat-9.3 < 0.10.4-5.34.el9_3.3
pkg:rpm/redhat/openssh?arch=x86_64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh?arch=s390x&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh?arch=ppc64le&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh?arch=aarch64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-server?arch=x86_64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-server?arch=s390x&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-server?arch=ppc64le&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-server?arch=aarch64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-keycat?arch=x86_64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-keycat?arch=s390x&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-keycat?arch=ppc64le&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-keycat?arch=aarch64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-clients?arch=x86_64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-clients?arch=s390x&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-clients?arch=ppc64le&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-clients?arch=aarch64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-askpass?arch=x86_64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-askpass?arch=s390x&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-askpass?arch=ppc64le&distro=redhat-9.3 < 8.7p1-34.el9_3.3
pkg:rpm/redhat/openssh-askpass?arch=aarch64&distro=redhat-9.3 < 8.7p1-34.el9_3.3
ID
RHSA-2024:1130
Severity
moderate
URL
https://access.redhat.com/errata/RHSA-2024:1130
Published
2024-03-05T00:00:00
(6 months ago)
Modified
2024-03-05T00:00:00
(6 months ago)
Rights
Copyright 2024 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/pam_ssh_agent_auth?arch=x86_64&distro=redhat-9.3 redhat pam_ssh_agent_auth < 0.10.4-5.34.el9_3.3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/pam_ssh_agent_auth?arch=s390x&distro=redhat-9.3 redhat pam_ssh_agent_auth < 0.10.4-5.34.el9_3.3 redhat-9.3 s390x
Affected pkg:rpm/redhat/pam_ssh_agent_auth?arch=ppc64le&distro=redhat-9.3 redhat pam_ssh_agent_auth < 0.10.4-5.34.el9_3.3 redhat-9.3 ppc64le
Affected pkg:rpm/redhat/pam_ssh_agent_auth?arch=aarch64&distro=redhat-9.3 redhat pam_ssh_agent_auth < 0.10.4-5.34.el9_3.3 redhat-9.3 aarch64
Affected pkg:rpm/redhat/openssh?arch=x86_64&distro=redhat-9.3 redhat openssh < 8.7p1-34.el9_3.3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/openssh?arch=s390x&distro=redhat-9.3 redhat openssh < 8.7p1-34.el9_3.3 redhat-9.3 s390x
Affected pkg:rpm/redhat/openssh?arch=ppc64le&distro=redhat-9.3 redhat openssh < 8.7p1-34.el9_3.3 redhat-9.3 ppc64le
Affected pkg:rpm/redhat/openssh?arch=aarch64&distro=redhat-9.3 redhat openssh < 8.7p1-34.el9_3.3 redhat-9.3 aarch64
Affected pkg:rpm/redhat/openssh-server?arch=x86_64&distro=redhat-9.3 redhat openssh-server < 8.7p1-34.el9_3.3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/openssh-server?arch=s390x&distro=redhat-9.3 redhat openssh-server < 8.7p1-34.el9_3.3 redhat-9.3 s390x
Affected pkg:rpm/redhat/openssh-server?arch=ppc64le&distro=redhat-9.3 redhat openssh-server < 8.7p1-34.el9_3.3 redhat-9.3 ppc64le
Affected pkg:rpm/redhat/openssh-server?arch=aarch64&distro=redhat-9.3 redhat openssh-server < 8.7p1-34.el9_3.3 redhat-9.3 aarch64
Affected pkg:rpm/redhat/openssh-keycat?arch=x86_64&distro=redhat-9.3 redhat openssh-keycat < 8.7p1-34.el9_3.3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/openssh-keycat?arch=s390x&distro=redhat-9.3 redhat openssh-keycat < 8.7p1-34.el9_3.3 redhat-9.3 s390x
Affected pkg:rpm/redhat/openssh-keycat?arch=ppc64le&distro=redhat-9.3 redhat openssh-keycat < 8.7p1-34.el9_3.3 redhat-9.3 ppc64le
Affected pkg:rpm/redhat/openssh-keycat?arch=aarch64&distro=redhat-9.3 redhat openssh-keycat < 8.7p1-34.el9_3.3 redhat-9.3 aarch64
Affected pkg:rpm/redhat/openssh-clients?arch=x86_64&distro=redhat-9.3 redhat openssh-clients < 8.7p1-34.el9_3.3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/openssh-clients?arch=s390x&distro=redhat-9.3 redhat openssh-clients < 8.7p1-34.el9_3.3 redhat-9.3 s390x
Affected pkg:rpm/redhat/openssh-clients?arch=ppc64le&distro=redhat-9.3 redhat openssh-clients < 8.7p1-34.el9_3.3 redhat-9.3 ppc64le
Affected pkg:rpm/redhat/openssh-clients?arch=aarch64&distro=redhat-9.3 redhat openssh-clients < 8.7p1-34.el9_3.3 redhat-9.3 aarch64
Affected pkg:rpm/redhat/openssh-askpass?arch=x86_64&distro=redhat-9.3 redhat openssh-askpass < 8.7p1-34.el9_3.3 redhat-9.3 x86_64
Affected pkg:rpm/redhat/openssh-askpass?arch=s390x&distro=redhat-9.3 redhat openssh-askpass < 8.7p1-34.el9_3.3 redhat-9.3 s390x
Affected pkg:rpm/redhat/openssh-askpass?arch=ppc64le&distro=redhat-9.3 redhat openssh-askpass < 8.7p1-34.el9_3.3 redhat-9.3 ppc64le
Affected pkg:rpm/redhat/openssh-askpass?arch=aarch64&distro=redhat-9.3 redhat openssh-askpass < 8.7p1-34.el9_3.3 redhat-9.3 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...