[CLSA-2024:1708638566] openssh: Fix of CVE-2023-48795
Type:
security
Severity:
Moderate
Release date:
2024-02-22 21:49:29 UTC
Description:
- CVE-2023-48795: implement "strict key exchange" in ssh and sshd
Updated packages:
  • openssh-8.7p1-30.el9_2.tuxcare.els4.x86_64.rpm
    sha:acd375ceb7b6294878b47bf25896825f5a5775a8
  • openssh-askpass-8.7p1-30.el9_2.tuxcare.els4.x86_64.rpm
    sha:1639a4cf052c606ba69ec7b5d08b3db421f66834
  • openssh-clients-8.7p1-30.el9_2.tuxcare.els4.x86_64.rpm
    sha:27076c1d9b9d6dff178aefa8821a6277bb8e30de
  • openssh-keycat-8.7p1-30.el9_2.tuxcare.els4.x86_64.rpm
    sha:1d2e989df1c037ebf83e7f93dcd8287da1a51f16
  • openssh-server-8.7p1-30.el9_2.tuxcare.els4.x86_64.rpm
    sha:74725b3d4c2191925736151dced9a840b3e5c81c
  • openssh-sk-dummy-8.7p1-30.el9_2.tuxcare.els4.x86_64.rpm
    sha:3c748b15e8c81ff5937e40d1ed77aaef446de88a
  • pam_ssh_agent_auth-0.10.4-5.30.el9_2.tuxcare.els4.x86_64.rpm
    sha:59e19b2835f0e05298b5d2fe06d9109199822b60
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.