[CLSA-2024:1718796706] openssh: Fix of CVE-2023-48795
Type:
security
Severity:
Moderate
Release date:
2024-06-19 11:31:49 UTC
Description:
- CVE-2023-48795: implement "strict key exchange" in ssh and sshd
Updated packages:
  • openssh-8.0p1-10.el8.tuxcare.els4.x86_64.rpm
    sha:a2b066b75adc8af32da20eb437bb758377faceaa
  • openssh-askpass-8.0p1-10.el8.tuxcare.els4.x86_64.rpm
    sha:8d80275d91222199b112081f63f700e3b7670a24
  • openssh-cavs-8.0p1-10.el8.tuxcare.els4.x86_64.rpm
    sha:1e893224412260c119079bab128b192e99987d69
  • openssh-clients-8.0p1-10.el8.tuxcare.els4.x86_64.rpm
    sha:66dad5841a801e22643ed68d43dfa07533919690
  • openssh-keycat-8.0p1-10.el8.tuxcare.els4.x86_64.rpm
    sha:f11f0170dafe4c0758c058088a03d512ce836ed6
  • openssh-ldap-8.0p1-10.el8.tuxcare.els4.x86_64.rpm
    sha:1c5a5d6912d87c48fd43e37079c209e53eb87de0
  • openssh-server-8.0p1-10.el8.tuxcare.els4.x86_64.rpm
    sha:9dddc06ed2206b5b6795532436ef2ac455fc1d49
  • pam_ssh_agent_auth-0.10.3-7.10.el8.tuxcare.els4.x86_64.rpm
    sha:2e4263232582c015d021629fa120d1c45755ef23
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.