Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-3233

Опубликовано: 23 мая 2024
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2024-3233: libssh security update (LOW)

[0.9.6-14]

  • Fix CVE-2023-48795 Prefix truncation attack on Binary Packet Protocol (BPP)
  • Fix CVE-2023-6918 Missing checks for return values for digests
  • Fix CVE-2023-6004 ProxyCommand/ProxyJump features allow injection of malicious code through hostname
  • Note: version is bumped from 12 to 14 directly, as the z-stream version in 8.9 also has 13. So bumping it to 14, will prevent upgrade conflicts.
  • Resolves:RHEL-19690, RHEL-17244, RHEL-19312

[0.9.6-12]

  • Fix loglevel regression
  • Related: rhbz#2182251, rhbz#2189742

[0.9.6-11]

  • .fmf/version is needed to run the tests
  • Related: rhbz#2182251, rhbz#2189742

[0.9.6-10]

  • Add missing ci.fmf file
  • Related: rhbz#2182251, rhbz#2189742

[0.9.6-9]

  • Fix covscan errors found at gating
  • Related: rhbz#2182251, rhbz#2189742

[0.9.6-8]

  • Backport test fixing commits to make the build pass
  • Related: rhbz#2182251, rhbz#2189742

[0.9.6-7]

  • Fix NULL dereference during rekeying with algorithm guessing GHSL-2023-032 / CVE-2023-1667
  • Fix possible authentication bypass GHSL 2023-085 / CVE-2023-2283
  • Resolves: rhbz#2182251, rhbz#2189742

[0.9.6-6]

  • Enable client and server testing build time
  • Fix failing rekey test on arch s390x
  • Resolves: rhbz#2126342

[0.9.6-5]

  • Fix CI configuration for new TMT
  • Resolves: rhbz#2149910

[0.9.6-4]

  • Make VERBOSE and lower log levels less verbose
  • Resolves: rhbz#2091512

[0.9.6-3]

  • Remove STI tests

[0.9.6-2]

  • Remove bad patch causing errors
  • Adding BuildRequires for openssh (SSHD support)

[0.9.6-1]

  • Fix CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with different key exchange mechanism
  • Rebase to version 0.9.6
  • Rename SSHD_EXECUTABLE to SSH_EXECUTABLE in tests/torture.c
  • Resolves: rhbz#1896651, rhbz#1994600

[0.9.4-4]

  • Revert previous commit as it is incorrect.

[0.9.6-1]

  • Fix CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with different key exchange mechanism (#1978810)

[0.9.4-3]

  • Fix CVE-2020-16135 NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL (#1862646)

[0.9.4-2]

  • Do not return error when server properly closed the channel (#1849071)
  • Add a test for CVE-2019-14889
  • Do not parse configuration file in torture_knownhosts test

[0.9.4-1]

[0.9.0-4]

  • Skip 1024 bits RSA key generation test in FIPS mode (#1734485)

[0.9.0-3]

  • Add Obsoletes in libssh-config to avoid conflict with old libssh which installed the configuration files.

[0.9.0-2]

  • Eliminate circular dependency with libssh-config subpackage

[0.9.0-1]

  • Update to version 0.9.0 https://www.libssh.org/2019/06/28/libssh-0-9-0/
  • Added explicit Requires for crypto-policies
  • Do not ignore known_hosts keys when SSH_OPTIONS_HOSTKEYS is set
  • Provide the configuration files in a separate libssh-config subpackage

[0.8.91-0.1]

  • Update to 0.9.0 pre release version (0.8.91)
  • Added default configuration files for client and server
  • Removed unused patch files left behind
  • Fixed issues found to run upstream test suite with SELinux

[0.8.5-2]

  • Fix more regressions introduced by the fixes for CVE-2018-10933

[0.8.5-1]

  • Update to version 0.8.5
    • Fixed an issue where global known_hosts file was ignored (#1649321)
    • Fixed ssh_get_fd() to return writable file descriptor (#1649319)
    • Fixed regression introduced in known_hosts parsing (#1649315)
    • Fixed a regression which caused only the first algorithm in known_hosts to be considered (#1638790)

[0.8.3-5]

  • Fix regressions introduced by the fixes for CVE-2018-10933

[0.8.3-4]

  • Fix for authentication bypass issue in server implementation (#1639926)

[0.8.3-3]

  • Fixed errors found by static code analysis (#1602594)

[0.8.3-1]

  • Update to version 0.8.3
    • Added support for rsa-sha2 (#1610882)
    • Added support to parse private keys in openssh container format (other than ed25519) (#1622983)
    • Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 (#1610885)
    • Added ssh_get_fingerprint_hash()
    • Added ssh_pki_export_privkey_base64()
    • Added support for Match keyword in config file
    • Improved performance and reduced memory footprint for sftp
    • Fixed ecdsa publickey auth
    • Fixed reading a closed channel
    • Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server
    • Use -fstack-protector-strong if possible (#1624135)

[0.8.1-4]

  • Fix the creation of symbolic links for libssh_threads.so.4

[0.8.1-3]

  • Add missing Provides for libssh_threads.so.4

[0.8.1-2]

  • Add Provides for libssh_threads.so to unbreak applications
  • Fix ABIMap detection to not depend on python to build

[0.8.1-1]

[0.8.0-1]

[0.7.5-9]

[0.7.5-8]

  • BR: gcc-c++, use %make_build

[0.7.5-7]

[0.7.5-6]

  • resolves: #1540021 - Build against OpenSSL 1.1

[0.7.5-5]

  • Switch to %ldconfig_scriptlets

[0.7.5-4]

  • Fix parsing ssh_config

[0.7.5-3]

[0.7.5-2]

[0.7.5-1]

  • Update to version 0.7.5

[0.7.4-2]

  • BR: compat-openssl10-devel (f26+, #1423088)
  • use %license
  • -devel: drop hardcoded pkgconfig dep (let autodeps handle it)
  • %files: track library sonames, simplify -devel
  • %install: use 'install/fast' target
  • .spec cosmetics, drop deprecated %clean section

[0.7.4-1]

  • Update to version 0.7.4
    • Added id_ed25519 to the default identity list
    • Fixed sftp EOF packet handling
    • Fixed ssh_send_banner() to confirm with RFC 4253
    • Fixed some memory leaks
  • resolves: #1419007

[0.7.3-1]

  • resolves: #1311259 - Fix CVE-2016-0739
  • resolves: #1311332 - Update to version 0.7.3
    • Fixed CVE-2016-0739
    • Fixed ssh-agent on big endian
    • Fixed some documentation issues
  • Enabled GSSAPI support

[0.7.2-3]

[0.7.2-2]

  • resolves: #1271230 - Fix ssh-agent support on big endian

[0.7.2-1]

  • Update to version 0.7.2
    • Fixed OpenSSL detection on Windows
    • Fixed return status for ssh_userauth_agent()
    • Fixed KEX to prefer hmac-sha2-256
    • Fixed sftp packet handling
    • Fixed return values of ssh_key_is_(public|private)
    • Fixed bug in global success reply
  • resolves: #1267346

[0.7.1-1]

  • Update to version 0.7.1
    • Fixed SSH_AUTH_PARTIAL auth with auto public key
    • Fixed memory leak in session options
    • Fixed allocation of ed25519 public keys
    • Fixed channel exit-status and exit-signal
    • Reintroduce ssh_forward_listen()

[0.7.0-3]

[0.7.0-2]

  • Add patch to fix undefined symbol: ssh_forward_listen (bug #1221310)

[0.7.0-1]

  • Update to version 0.7.0
    • Added support for ed25519 keys
    • Added SHA2 algorithms for HMAC
    • Added improved and more secure buffer handling code
    • Added callback for auth_none_function
    • Added support for ECDSA private key signing
    • Added more tests
    • Fixed a lot of bugs
    • Improved API documentation

[0.6.5-1]

  • resolves: #1213775 - Security fix for CVE-2015-3146
  • resolves: #1218076 - Security fix for CVE-2015-3146

[0.6.4-1]

  • Security fix for CVE-2014-8132.

[0.6.3-3]

[0.6.3-2]

[0.6.3-1]

  • Fix CVE-2014-0017.

[0.6.1-1]

  • Update to version 0.6.1.
  • resolves: #1056757 - Fix scp mode.
  • resolves: #1053305 - Fix known_hosts heuristic.

[0.6.0-1]

  • Update to 0.6.0

[0.5.5-1]

  • Update to 0.5.5.
  • Clenup the spec file.

[0.5.4-5]

  • Add EPEL 5 support.
  • Add Debian patches to enable Doxygen documentation.

[0.5.4-4]

  • Add patch for #982685.

[0.5.4-3]

  • Clean up SPEC file and fix rpmlint complaints.

[0.5.4-2]

[0.5.4-1]

  • update to security 0.5.4 release
  • CVE-2013-0176 (#894407)

[0.5.3-1]

  • update to security 0.5.3 release (#878465)

[0.5.2-2]

[0.5.2-1]

  • update to 0.5.2 version (#730270)

[0.5.0-2]

[0.5.0-1]

  • bounce versionn to 0.5.0 (#709785)
  • the support for protocol v1 is disabled

[0.4.8-2]

[0.4.8-1]

  • bounce versionn to 0.4.8 (#670456)

[0.4.6-1]

  • bounce versionn to 0.4.6 (#630602)

[0.4.4-1]

  • bounce versionn to 0.4.4 (#598592)

[0.4.3-1]

  • bounce versionn to 0.4.3 (#593288)

[0.4.2-1]

  • bounce versionn to 0.4.2 (#573972)

[0.4.1-1]

  • bounce versionn to 0.4.1 (#565870)

[0.4.0-1]

  • bounce versionn to 0.4.0 (#541010)

[0.3.92-2]

  • typo in spec file

[0.3.92-1]

  • bounce versionn to 0.3.92 (0.4 beta2) (#541010)

[0.2-4]

  • rebuilt with new openssl

[0.2-3]

[0.2-2]

  • Small changes during review

[0.2-1]

  • Initial build

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libssh

0.9.6-14.el8

libssh-config

0.9.6-14.el8

libssh-devel

0.9.6-14.el8

Oracle Linux x86_64

libssh

0.9.6-14.el8

libssh-config

0.9.6-14.el8

libssh-devel

0.9.6-14.el8

Связанные CVE

Связанные уязвимости

rocky
около 1 года назад

Low: libssh security update

oracle-oval
около 1 года назад

ELSA-2024-2504: libssh security update (LOW)

CVSS3: 5.3
redos
около 1 года назад

Множественные уязвимости libssh

suse-cvrf
больше 1 года назад

Security update for libssh

suse-cvrf
больше 1 года назад

Security update for libssh