[CLSA-2023:1703611900] Fix CVE(s): CVE-2023-51385
Type:
security
Severity:
Critical
Release date:
2023-12-26 17:31:44 UTC
Description:
* SECURITY UPDATE: possible OS command injection - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most shell metacharacters in command line - CVE-2023-51385
Updated packages:
  • openssh-client_7.2p2-4ubuntu2.10+tuxcare.els4_amd64.deb
    sha:cdd8a814edd8fe7305e763a588ca49688e1d6226
  • openssh-client-ssh1_7.2p2-4ubuntu2.10+tuxcare.els4_amd64.deb
    sha:157abab02f9fee65169934b65c7311109bbfb36d
  • openssh-server_7.2p2-4ubuntu2.10+tuxcare.els4_amd64.deb
    sha:859ac1d2e8a67c365756a7b012ce213bae3bfcde
  • openssh-sftp-server_7.2p2-4ubuntu2.10+tuxcare.els4_amd64.deb
    sha:c4abe41686ca60320cb96eb403e797d2e0d110c3
  • ssh_7.2p2-4ubuntu2.10+tuxcare.els4_all.deb
    sha:71e733cc862a5bb4bfad04b0408fb3979a0a64ba
  • ssh-askpass-gnome_7.2p2-4ubuntu2.10+tuxcare.els4_amd64.deb
    sha:af5b7929510f87d97611174e6760eeaa55a92036
  • ssh-krb5_7.2p2-4ubuntu2.10+tuxcare.els4_all.deb
    sha:4209e040b41d663f0de03937f10546118b4477f4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.