Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2020:4545

Опубликовано: 03 нояб. 2020
Источник: rocky
Оценка: Moderate

Описание

Moderate: libssh security, bug fix, and enhancement update

libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.

The following packages have been upgraded to a later upstream version: libssh (0.9.4). (BZ#1804797)

Security Fix(es):

  • libssh: denial of service when handling AES-CTR (or DES) ciphers (CVE-2020-1730)

  • libssh: unsanitized location in scp could lead to unwanted command execution (CVE-2019-14889)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
libsshi6862.el8libssh-0.9.4-2.el8.i686.rpm
libsshx86_642.el8libssh-0.9.4-2.el8.x86_64.rpm
libssh-confignoarch2.el8libssh-config-0.9.4-2.el8.noarch.rpm
libssh-confignoarch2.el8libssh-config-0.9.4-2.el8.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
около 5 лет назад

ELSA-2020-4545: libssh security, bug fix, and enhancement update (MODERATE)

suse-cvrf
почти 2 года назад

Security update for libssh

suse-cvrf
почти 2 года назад

Security update for libssh

CVSS3: 5.3
ubuntu
больше 5 лет назад

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.

CVSS3: 5.3
redhat
больше 5 лет назад

A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.