[CLSA-2024:1707420378] Fix CVE(s): CVE-2023-48795
Type:
security
Severity:
Moderate
Release date:
2024-02-08 19:26:21 UTC
Description:
* SECURITY UPDATE: it's possible to remove the initial messages on the secure channel without causing a MAC failure - debian/patches/CVE-2023-48795.patch: implement "strict key exchange" in ssh and sshd - CVE-2023-48795
Updated packages:
  • openssh-client_7.2p2-4ubuntu2.10+tuxcare.els5_amd64.deb
    sha:ef4c5889635a9432979a75f5ca486a4ae561db36
  • openssh-client-ssh1_7.2p2-4ubuntu2.10+tuxcare.els5_amd64.deb
    sha:96c7765e927563fb4edbf2c4ca102b6571f80d27
  • openssh-server_7.2p2-4ubuntu2.10+tuxcare.els5_amd64.deb
    sha:0ccfa1d58555ece9c418b140308990fdd2c04272
  • openssh-sftp-server_7.2p2-4ubuntu2.10+tuxcare.els5_amd64.deb
    sha:4c02d26145023a41bfef44d63d4f70c66847548b
  • ssh_7.2p2-4ubuntu2.10+tuxcare.els5_all.deb
    sha:1efae115b4370b35561455da1288162c36a25005
  • ssh-askpass-gnome_7.2p2-4ubuntu2.10+tuxcare.els5_amd64.deb
    sha:8cf5d7d5f14d1d535c4a8dec9f3c516e592afc58
  • ssh-krb5_7.2p2-4ubuntu2.10+tuxcare.els5_all.deb
    sha:59325c5514a406465a7295e27680e20efc88a2d0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.