{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2023:3839","synopsis":"Moderate: libssh security update","severity":"SEVERITY_MODERATE","topic":"An update is available for libssh.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.\n\nSecurity Fix(es):\n\n* libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667)\n\n* libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2182199","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2182199","description":""},{"ticket":"2189736","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2189736","description":""}],"cves":[{"name":"CVE-2023-1667","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-1667","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-2283","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-2283","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"}],"references":[],"publishedAt":"2023-07-08T02:54:11.077184Z","rpms":{"Rocky Linux 8":{"nvras":["libssh-0:0.9.6-10.el8_8.aarch64.rpm","libssh-0:0.9.6-10.el8_8.src.rpm","libssh-config-0:0.9.6-10.el8_8.noarch.rpm","libssh-debuginfo-0:0.9.6-10.el8_8.aarch64.rpm","libssh-debugsource-0:0.9.6-10.el8_8.aarch64.rpm","libssh-devel-0:0.9.6-10.el8_8.aarch64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2023:3839 libssh security update

July 8, 2023
An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667) * libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

libssh-0:0.9.6-10.el8_8.aarch64.rpm

libssh-0:0.9.6-10.el8_8.src.rpm

libssh-config-0:0.9.6-10.el8_8.noarch.rpm

libssh-debuginfo-0:0.9.6-10.el8_8.aarch64.rpm

libssh-debugsource-0:0.9.6-10.el8_8.aarch64.rpm

libssh-devel-0:0.9.6-10.el8_8.aarch64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1667

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283

Severity
Name: RLSA-2023:3839
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2182199

https://bugzilla.redhat.com/show_bug.cgi?id=2189736


Related News