First published: Tue Jun 27 2023(Updated: )
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.<br>Security Fix(es):<br><li> libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667)</li> <li> libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libssh | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-config | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-debuginfo | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-debuginfo | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-debugsource | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-debugsource | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-devel | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-devel | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-debuginfo | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-debugsource | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh-devel | <0.9.6-10.el8_8 | 0.9.6-10.el8_8 |
redhat/libssh | <0.9.6-10.el8_8.aa | 0.9.6-10.el8_8.aa |
redhat/libssh-debuginfo | <0.9.6-10.el8_8.aa | 0.9.6-10.el8_8.aa |
redhat/libssh-debugsource | <0.9.6-10.el8_8.aa | 0.9.6-10.el8_8.aa |
redhat/libssh-devel | <0.9.6-10.el8_8.aa | 0.9.6-10.el8_8.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:3839 is categorized as important due to the vulnerabilities in the libssh library.
To fix RHSA-2023:3839, you need to update the libssh package to version 0.9.6-10.el8_8 or later.
RHSA-2023:3839 addresses vulnerabilities including a NULL pointer dereference and an authorization bypass during rekeying.
RHSA-2023:3839 affects systems running the libssh package versions prior to 0.9.6-10.el8_8.
There are no official workarounds for RHSA-2023:3839; updating the affected packages is the recommended action.