[ALSA-2023:6643] Moderate: libssh security update
Type:
security
Severity:
moderate
Release date:
2023-11-14
Description:
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667) * libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 libssh-devel-0.10.4-11.el9.aarch64.rpm 2d78cb06b86828fa8ce5851204cc57c51812133b41b8592154ce83c926b94673
aarch64 libssh-0.10.4-11.el9.aarch64.rpm dc948a5601434dec9600af659f855cd924960695ba5a13bd4982b6c0a09cd35a
i686 libssh-0.10.4-11.el9.i686.rpm 33c24793c18f0d437952f18203d1288e73775a8122ef8aa29aade08fd9cd2720
i686 libssh-devel-0.10.4-11.el9.i686.rpm 4c9f895f50df7e0134a2bb8585a6efad136499bc8821d04975bbb93d876f6186
noarch libssh-config-0.10.4-11.el9.noarch.rpm af58c892b03758b07d0fa31a25a95e98bfb76307b8130808fb14f239c2da9891
ppc64le libssh-devel-0.10.4-11.el9.ppc64le.rpm a00e519e0acd368e6f45e54744ec85e308910588ba66825e8915eb02516a5d1d
ppc64le libssh-0.10.4-11.el9.ppc64le.rpm f38bc4f0c499ecd163f577bf20e6cad325787a37eb43c99071cbde8b58529150
s390x libssh-devel-0.10.4-11.el9.s390x.rpm 074c98cb09f094df18da13936edfe1c6bf12fa21f669f4f34f2fc1eafcd8c29c
s390x libssh-0.10.4-11.el9.s390x.rpm 2824146f6a70aa73e5533f5e572a519dfa783d1b19ec1fb99ab80b3a02f46c4f
x86_64 libssh-devel-0.10.4-11.el9.x86_64.rpm 23ca0b54c048343d6add474d6a6902827f0f0036de32e17b3b72499bb1e2ef96
x86_64 libssh-0.10.4-11.el9.x86_64.rpm c4458c8de488b445cc50872daca5250d405209db95fd03a2651af30e04186fb5
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.