Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202212-06

Gentoo Linux Security Advisory 202212-6 - Multiple vulnerabilities have been found in OpenSSH, the worst of which could result in arbitrary code execution. Versions less than 9.1_p1 are affected.

Packet Storm
#vulnerability#web#mac#linux#ssh#telnet

Gentoo Linux Security Advisory GLSA 202212-06


                                       https://security.gentoo.org/  

Severity: High
Title: OpenSSH: Multiple Vulnerabilities
Date: December 28, 2022
Bugs: #874876, #733802, #815010
ID: 202212-06


Synopsis

Multiple vulnerabilities have been found in OpenSSH, the worst of which
could result in arbitrary code execution.

Background

OpenSSH is a free application suite consisting of server and clients
that replace tools like telnet, rlogin, rcp and ftp with more secure
versions offering additional functionality.

Affected packages

-------------------------------------------------------------------  
 Package              /     Vulnerable     /            Unaffected  
-------------------------------------------------------------------  

1 net-misc/openssh < 9.1_p1 >= 9.1_p1

Description

Multiple vulnerabilities have been discovered in OpenSSH. Please review
the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All OpenSSH users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=net-misc/openssh-9.1_p1”

References

[ 1 ] CVE-2020-15778
https://nvd.nist.gov/vuln/detail/CVE-2020-15778

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202212-06

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

CVE-2020-15778: GitHub - cpandya2909/CVE-2020-15778

** DISPUTED ** scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution