cvrf2cusa/cusa/O/openssh/openssh-8.8p1-17_openEuler-SA-2023-1063.json
Jia Chao fd42fc96e3 release v0.1.2
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-08-01 10:25:22 +08:00

14 lines
1.1 KiB
JSON

{
"id": "openEuler-SA-2023-1063",
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1063",
"title": "An update for openssh is now available for openEuler-22.03-LTS",
"severity": "Medium",
"description": "OpenSSH is the premier connectivity tool for remote login with the SSH protocol. \\ It encrypts all traffic to eliminate eavesdropping, connection hijacking, and \\ other attacks. In addition, OpenSSH provides a large suite of secure tunneling \\ capabilities, several authentication methods, and sophisticated configuration options.\r\n\r\nSecurity Fix(es):\r\n\r\nOpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration. One third-party report states \"remote code execution is theoretically possible.\"(CVE-2023-25136)",
"cves": [
{
"id": "CVE-2023-25136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25136",
"severity": "Medium"
}
]
}