{"affected":[{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.3","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP5","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-ESPOS","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-LTSS","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 15 SP4","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP4-LTSS","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP4","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Manager Proxy 4.3","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Manager%20Proxy%204.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"SUSE:Manager Server 4.3","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Manager%20Server%204.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap Micro 5.3","name":"libssh","purl":"pkg:rpm/opensuse/libssh&distro=openSUSE%20Leap%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap Micro 5.4","name":"libssh","purl":"pkg:rpm/opensuse/libssh&distro=openSUSE%20Leap%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150400.3.3.1","libssh-devel":"0.9.8-150400.3.3.1","libssh4":"0.9.8-150400.3.3.1","libssh4-32bit":"0.9.8-150400.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"libssh","purl":"pkg:rpm/opensuse/libssh&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150400.3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libssh fixes the following issues:\n\nSecurity fixes:\n\n  - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209)\n  - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126)\n  - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186)\n  - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm  guessing (bsc#1211188)\n  - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)\n\nOther fixes:\n\n- Update to version 0.9.8\n  - Allow @ in usernames when parsing from URI composes\n\n- Update to version 0.9.7\n  - Fix several memory leaks in GSSAPI handling code\n","id":"SUSE-SU-2024:0140-1","modified":"2024-01-18T10:35:00Z","published":"2024-01-18T10:35:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240140-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-48795"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6918"}],"related":["CVE-2023-1667","CVE-2023-2283","CVE-2023-48795","CVE-2023-6004","CVE-2023-6918"],"summary":"Security update for libssh","upstream":["CVE-2023-1667","CVE-2023-2283","CVE-2023-48795","CVE-2023-6004","CVE-2023-6918"]}