[SSA:2023-353-01] libssh
New libssh packages are available for Slackware 14.2, 15.0, and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog
patches/packages/libssh-0.10.6-i586-1_slack15.0.txz: Upgraded.
This update fixes security issues:
Command injection using proxycommand.
Potential downgrade attack using strict kex.
Missing checks for return values of MD functions.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-6004
https://www.cve.org/CVERecord?id=CVE-2023-48795
https://www.cve.org/CVERecord?id=CVE-2023-6918
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/libssh-0.10.6-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/libssh-0.10.6-x86_64-1_slack14.2.txz
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/libssh-0.10.6-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/libssh-0.10.6-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/libssh-0.10.6-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/libssh-0.10.6-x86_64-1.txz
MD5 signatures
Slackware 14.2 package:
df594d833d2b61430550c4a6249e8e16 libssh-0.10.6-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
697e225933eb11593ee2db6dca0d38a8 libssh-0.10.6-x86_64-1_slack14.2.txz
Slackware 15.0 package:
122816350a43ac336e1f48fcf3c0b2aa libssh-0.10.6-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
09688c662806fcfbc8b7f2b3bf408674 libssh-0.10.6-x86_64-1_slack15.0.txz
Slackware -current package:
c3a0ff73b4a2d523f99a5e06b4b8df75 l/libssh-0.10.6-i586-1.txz
Slackware x86_64 -current package:
01fba0c880daaf7536dcf31cc5553708 l/libssh-0.10.6-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg libssh-0.10.6-i586-1_slack15.0.txz
- ID
- SSA:2023-353-01
- Severity
- medium
- Severity from
- CVE-2023-48795
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2023&m=slackware-security.394037
- Published
-
2023-12-19T21:31:02
(9 months ago) - Modified
-
2023-12-19T21:31:02
(9 months ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2023-1898
- ALAS2-2023-2376
- ALPINE:CVE-2023-48795
- ALPINE:CVE-2023-6004
- ALPINE:CVE-2023-6918
- ALSA-2024:0606
- ALSA-2024:0628
- ALSA-2024:1130
- ALSA-2024:1150
- ALSA-2024:2504
- ALSA-2024:3233
- DSA-5586-1
- DSA-5588-1
- DSA-5591-1
- DSA-5599-1
- DSA-5600-1
- DSA-5601-1
- DSA-5750-1
- ELSA-2024-0606
- ELSA-2024-0628
- ELSA-2024-1130
- ELSA-2024-1150
- ELSA-2024-12157
- ELSA-2024-12158
- ELSA-2024-12164
- ELSA-2024-12232
- ELSA-2024-12233
- ELSA-2024-2504
- ELSA-2024-2988
- ELSA-2024-3233
- FEDORA-2023-0733306be9
- FEDORA-2023-153404713b
- FEDORA-2023-20feb865d8
- FEDORA-2023-55800423a8
- FEDORA-2023-b87ec6cf47
- FEDORA-2023-cb8c606fbb
- FEDORA-2023-e77300e4b5
- FEDORA-2024-06ebb70bdd
- FEDORA-2024-2705241461
- FEDORA-2024-37627e432e
- FEDORA-2024-39a8c72ea9
- FEDORA-2024-3bb23c77f3
- FEDORA-2024-3fd1bc9276
- FEDORA-2024-71c2c6526c
- FEDORA-2024-7b08207cdb
- FEDORA-2024-7e301327c2
- FEDORA-2024-a53b24023d
- FEDORA-2024-ae653fb07b
- FEDORA-2024-d946b9ad25
- FEDORA-2024-fb32950d11
- FREEBSD:0F7598CC-9FE2-11EE-B47F-901B0E9408DC
- FREEBSD:13D83980-9F18-11EE-8E38-002590C1F29C
- FREEBSD:4EBDD56B-FE72-11EE-BC57-00E081B7AA2D
- FREEBSD:91955195-9EBB-11EE-BC14-A703705DB3A6
- FREEBSD:B5E22EC5-BC4B-11EE-B0B5-B42E991FC52E
- GLSA-202312-16
- GLSA-202312-17
- GLSA-202407-11
- GLSA-202407-12
- GO-2023-2402
- JENKINS:SECURITY-3333
- JENKINS:SECURITY-3386
- openSUSE-SU-2023:0411-1
- openSUSE-SU-2023:0421-1
- openSUSE-SU-2024:0005-1
- openSUSE-SU-2024:0008-1
- openSUSE-SU-2024:0036-1
- RHBA-2024:1127
- RHBA-2024:1136
- RHSA-2024:0606
- RHSA-2024:0628
- RHSA-2024:1130
- RHSA-2024:1150
- RHSA-2024:2504
- RHSA-2024:2988
- RHSA-2024:3233
- RLSA-2024:0606
- RLSA-2024:0628
- RLSA-2024:3233
- SSA:2023-354-01
- SUSE-SU-2023:4902-1
- SUSE-SU-2023:4903-1
- SUSE-SU-2023:4904-1
- SUSE-SU-2023:4905-1
- SUSE-SU-2023:4946-1
- SUSE-SU-2024:0006-1
- SUSE-SU-2024:0035-1
- SUSE-SU-2024:0140-1
- SUSE-SU-2024:0210-1
- SUSE-SU-2024:0224-1
- SUSE-SU-2024:0327-1
- SUSE-SU-2024:0430-1
- SUSE-SU-2024:0460-1
- SUSE-SU-2024:0525-1
- SUSE-SU-2024:0539-1
- SUSE-SU-2024:0543-1
- SUSE-SU-2024:0558-1
- SUSE-SU-2024:0972-1
- SUSE-SU-2024:0974-1
- USN-6560-1
- USN-6560-2
- USN-6561-1
- USN-6585-1
- USN-6589-1
- USN-6592-1
- USN-6592-2
- USN-6598-1
- USN-6738-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/libssh?arch=x86_64&distro=slackware64-current | slackware | libssh | < 0.10.6 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/libssh?arch=x86_64&distro=slackware64-15.0 | slackware | libssh | < 0.10.6 | slackware64-15.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/libssh?arch=x86_64&distro=slackware64-14.2 | slackware | libssh | < 0.10.6 | slackware64-14.2 | x86_64 | |
Affected | pkg:slackbuild/slackware/libssh?arch=i586&distro=slackware-current | slackware | libssh | < 0.10.6 | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/libssh?arch=i586&distro=slackware-15.0 | slackware | libssh | < 0.10.6 | slackware-15.0 | i586 | |
Affected | pkg:slackbuild/slackware/libssh?arch=i586&distro=slackware-14.2 | slackware | libssh | < 0.10.6 | slackware-14.2 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |