[CLSA-2024:1707420183] Fix CVE(s): CVE-2023-48795
Type:
security
Severity:
Moderate
Release date:
2024-02-08 19:23:05 UTC
Description:
* SECURITY UPDATE: it's possible to remove the initial messages on the secure channel without causing a MAC failure - debian/patches/CVE-2023-48795.patch: implement "strict key exchange" in ssh and sshd - CVE-2023-48795
Updated packages:
  • openssh-client_7.6p1-4ubuntu0.7+tuxcare.els5_amd64.deb
    sha:80fad61a0116d60636926470bcb0766bcf612813
  • openssh-server_7.6p1-4ubuntu0.7+tuxcare.els5_amd64.deb
    sha:6b6f1b5bb80f5a782cdc687265ffca1db739c433
  • openssh-sftp-server_7.6p1-4ubuntu0.7+tuxcare.els5_amd64.deb
    sha:14257e29fc71248d35578f7e42803350dc63b59b
  • ssh_7.6p1-4ubuntu0.7+tuxcare.els5_all.deb
    sha:bcefabafc745205be509f11568b8128a1119d8a2
  • ssh-askpass-gnome_7.6p1-4ubuntu0.7+tuxcare.els5_amd64.deb
    sha:19b4884858cc223616937703af8820467a962e5b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.