-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEGq96SdAIJY1vInRLbzAtCH6LqTYFAmXA4LoFAwAAAAAACgkQbzAtCH6LqTYP
vQf7BpOPjt+lGZzL9lKaeIl+7K/+bUlb/9PzR2avXvnMxsQpXwUtMO7aGSfGpv4B7ySCSakeogFK
Opz7mqRrZAeX45krIpfPP3MNeyVp73BDGDdX5rxGBa1teD6IwLMIM7GQ7D5/dbdPHGOMuDU/yclm
VThbFC/neuhYCdrcaC5FVIeQl3/5mLt23RkZTnyD/gXkUfY5Glrvssj9S7HnVR34bdGvVigeZ9Yb
GAW2g+wGnlKA4w4nxMZUTQqeTLHSlOZhl4JxxLQjxR8fL95E1Wd52qJiE1zkLHVBdyj+eDiJpt78
yLBinSx3JdbvUMFU0Q4hw+EGNwD5Y0VGNKdY7KNorg==
=WzEz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6592-2
February 05, 2024
libssh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in libssh.
Software Description:
- libssh: A tiny C SSH library
Details:
USN-6592-1 fixed vulnerabilities in libssh. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that libssh incorrectly handled the ProxyCommand and the
ProxyJump features. A remote attacker could possibly use this issue to
inject malicious code into the command of the features mentioned through
the hostname parameter. (CVE-2023-6004)
It was discovered that libssh incorrectly handled return codes when
performing message digest operations. A remote attacker could possibly use
this issue to cause libssh to crash, obtain sensitive information, or
execute arbitrary code. (CVE-2023-6918)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libssh-4 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3
libssh-gcrypt-4 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm3
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libssh-4 0.6.3-4.3ubuntu0.6+esm1
libssh-gcrypt-4 0.6.3-4.3ubuntu0.6+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6592-2
https://ubuntu.com/security/notices/USN-6592-1
CVE-2023-6004, CVE-2023-6918
No comments:
Post a Comment