[Git][security-tracker-team/security-tracker][master] Track fixed version for libssh issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Dec 22 15:27:14 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c708efe9 by Salvatore Bonaccorso at 2023-12-22T16:25:32+01:00
Track fixed version for libssh issues

Note: The issue for CVE-2023-6004 is marked explicitly as fixed even
though has just still a functional regression in IPv6 parsing, not part
of the CVE. Though any update in stable, oldstable suites will need to
make sure the regression is as well fixed.

Martin Pitt will fix this for unstable once 0.10.7 is released, cf
https://bugs.debian.org/1059061

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1026,7 +1026,7 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun
 	[bullseye] - erlang <no-dsa> (Minor issue)
 	- golang-go.crypto <unfixed> (bug #1059003)
 	- jsch <not-affected> (ChaCha20-Poly1305 support introduced in 0.1.61; *-EtM support introduced in 0.1.58)
-	- libssh <unfixed> (bug #1059004)
+	- libssh 0.10.6-1 (bug #1059004)
 	- libssh2 <unfixed> (bug #1059005)
 	[bookworm] - libssh2 <not-affected> (ChaCha20-Poly1305 and CBC-EtM support not present)
 	[bullseye] - libssh2 <not-affected> (ChaCha20-Poly1305 and CBC-EtM support not present)
@@ -5679,14 +5679,14 @@ CVE-2023-6008 (The UserPro plugin for WordPress is vulnerable to Cross-Site Requ
 CVE-2023-6007 (The UserPro plugin for WordPress is vulnerable to unauthorized access  ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2023-6918 (A flaw was found in the libssh implements abstract layer for message d ...)
-	- libssh <unfixed> (bug #1059059)
+	- libssh 0.10.6-1 (bug #1059059)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/610d7a09f99c601224ae2aa3d3de7e75b1d284dd (libssh-0.10.6)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/63ff242131c8e6d98917456f71f6d33b9ef3a763 (libssh-0.10.6)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/8b66d037d575e5f3ce4d35964547ff8c7e75ff8e (libssh-0.10.6)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/8977e246b6d7ae467cab008a49e0a9e3d84bc2a0 (libssh-0.10.6)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/622421018b58392ffecc29726b947e089b678221 (libssh-0.10.6)
 CVE-2023-6004
-	- libssh <unfixed> (bug #1059061)
+	- libssh 0.10.6-1 (bug #1059061)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/c2c56bacab00766d01671413321d564227aabf19 (libssh-0.10.6)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/a66b4a6eae6614d200a3625862d77565b96a7cd3 (libssh-0.10.6)
 	NOTE: https://gitlab.com/libssh/libssh-mirror/-/commit/8615c24647f773a5e04203c7459512715d698be1 (libssh-0.10.6)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c708efe94f2019bfd62a92de806725032b1981d6

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c708efe94f2019bfd62a92de806725032b1981d6
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231222/bddf8fb4/attachment.htm>


More information about the debian-security-tracker-commits mailing list