{"affected":[{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh-devel":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1","libssh4-32bit":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP2-LTSS","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh-devel":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1","libssh4-32bit":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh-devel":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1","libssh4-32bit":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-LTSS","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh-devel":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1","libssh4-32bit":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh-devel":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1","libssh4-32bit":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP2","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh-devel":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1","libssh4-32bit":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libssh-config":"0.9.8-150200.13.3.1","libssh-devel":"0.9.8-150200.13.3.1","libssh4":"0.9.8-150200.13.3.1","libssh4-32bit":"0.9.8-150200.13.3.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"libssh","purl":"pkg:rpm/suse/libssh&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.8-150200.13.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libssh fixes the following issues:\n\nUpdate to version 0.9.8 (jsc#PED-7719):\n\n* Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209)\n* Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126)\n* Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186)\n* Allow @ in usernames when parsing from URI composes\n\nUpdate to version 0.9.7:\n\n* Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm\n  guessing (bsc#1211188)\n* Fix CVE-2023-2283: a possible authorization bypass in\n  pki_verify_data_signature under low-memory conditions (bsc#1211190)\n* Fix several memory leaks in GSSAPI handling code\n\nUpdate to version 0.9.6 (bsc#1189608, CVE-2021-3634):\n\n* https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6\n\n\nUpdate to 0.9.5 (bsc#1174713, CVE-2020-16135):\n\n* CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232)\n* Improve handling of library initialization (T222)\n* Fix parsing of subsecond times in SFTP (T219)\n* Make the documentation reproducible\n* Remove deprecated API usage in OpenSSL\n* Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN\n* Define version in one place (T226)\n* Prevent invalid free when using different C runtimes than OpenSSL (T229)\n* Compatibility improvements to testsuite \n\nUpdate to version 0.9.4\n\n* https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/\n* Fix possible Denial of Service attack when using AES-CTR-ciphers\n  CVE-2020-1730 (bsc#1168699)\n\nUpdate to version 0.9.3\n\n* Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095)\n* SSH-01-003 Client: Missing NULL check leads to crash in erroneous state\n* SSH-01-006 General: Various unchecked Null-derefs cause DOS\n* SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys\n* SSH-01-010 SSH: Deprecated hash function in fingerprinting\n* SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS\n* SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access\n* SSH-01-001 State Machine: Initial machine states should be set explicitly\n* SSH-01-002 Kex: Differently bound macros used to iterate same array\n* SSH-01-005 Code-Quality: Integer sign confusion during assignments\n* SSH-01-008 SCP: Protocol Injection via unescaped File Names\n* SSH-01-009 SSH: Update documentation which RFCs are implemented\n* SSH-01-012 PKI: Information leak via uninitialized stack buffer\n\nUpdate to version 0.9.2\n\n* Fixed libssh-config.cmake\n* Fixed issues with rsa algorithm negotiation (T191)\n* Fixed detection of OpenSSL ed25519 support (T197)\n\nUpdate to version 0.9.1\n\n* Added support for Ed25519 via OpenSSL\n* Added support for X25519 via OpenSSL\n* Added support for localuser in Match keyword\n* Fixed Match keyword to be case sensitive\n* Fixed compilation with LibreSSL\n* Fixed error report of channel open (T75)\n* Fixed sftp documentation (T137)\n* Fixed known_hosts parsing (T156)\n* Fixed build issue with MinGW (T157)\n* Fixed build with gcc 9 (T164)\n* Fixed deprecation issues (T165)\n* Fixed known_hosts directory creation (T166)\n\n- Split out configuration to separate package to not mess up the\n  library packaging and coinstallation\n\nUpdate to verion 0.9.0\n\n* Added support for AES-GCM\n* Added improved rekeying support\n* Added performance improvements\n* Disabled blowfish support by default\n* Fixed several ssh config parsing issues\n* Added support for DH Group Exchange KEX\n* Added support for Encrypt-then-MAC mode\n* Added support for parsing server side configuration file\n* Added support for ECDSA/Ed25519 certificates\n* Added FIPS 140-2 compatibility\n* Improved known_hosts parsing\n* Improved documentation\n* Improved OpenSSL API usage for KEX, DH, and signatures\n\n- Add libssh client and server config files\n","id":"SUSE-SU-2024:0525-1","modified":"2024-02-19T07:04:14Z","published":"2024-02-19T07:04:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240525-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168699"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174713"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189608"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-16135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-1730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3634"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-48795"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6918"}],"related":["CVE-2019-14889","CVE-2020-16135","CVE-2020-1730","CVE-2021-3634","CVE-2023-1667","CVE-2023-2283","CVE-2023-48795","CVE-2023-6004","CVE-2023-6918"],"summary":"Security update for libssh","upstream":["CVE-2019-14889","CVE-2020-16135","CVE-2020-1730","CVE-2021-3634","CVE-2023-1667","CVE-2023-2283","CVE-2023-48795","CVE-2023-6004","CVE-2023-6918"]}