Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-2645

Опубликовано: 17 мая 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-2645: openssh security update (MODERATE)

[8.7p1-29]

  • Resolve possible self-DoS with some clients Resolves: rhbz#2186473

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

openssh

8.7p1-29.el9_2

openssh-askpass

8.7p1-29.el9_2

openssh-clients

8.7p1-29.el9_2

openssh-keycat

8.7p1-29.el9_2

openssh-server

8.7p1-29.el9_2

pam_ssh_agent_auth

0.10.4-5.29.el9_2

Oracle Linux x86_64

openssh

8.7p1-29.el9_2

openssh-askpass

8.7p1-29.el9_2

openssh-clients

8.7p1-29.el9_2

openssh-keycat

8.7p1-29.el9_2

openssh-server

8.7p1-29.el9_2

pam_ssh_agent_auth

0.10.4-5.29.el9_2

Связанные CVE

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
redhat
около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
nvd
около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
msrc
4 месяца назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

CVSS3: 6.5
debian
около 3 лет назад

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ...