<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libssh-config-0.9.6-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10998</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libssh-config-0.9.6-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libssh-config-0.9.6-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10998</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10933/</URL>
      <Description>SUSE CVE CVE-2018-10933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14889/</URL>
      <Description>SUSE CVE CVE-2019-14889 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-16135/</URL>
      <Description>SUSE CVE CVE-2020-16135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3634/</URL>
      <Description>SUSE CVE CVE-2021-3634 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libssh-config-0.9.6-1.2">
      <FullProductName ProductID="libssh-config-0.9.6-1.2">libssh-config-0.9.6-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh-devel-0.9.6-1.2">
      <FullProductName ProductID="libssh-devel-0.9.6-1.2">libssh-devel-0.9.6-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh4-0.9.6-1.2">
      <FullProductName ProductID="libssh4-0.9.6-1.2">libssh4-0.9.6-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libssh4-32bit-0.9.6-1.2">
      <FullProductName ProductID="libssh4-32bit-0.9.6-1.2">libssh4-32bit-0.9.6-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libssh-config-0.9.6-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libssh-config-0.9.6-1.2">libssh-config-0.9.6-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh-devel-0.9.6-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libssh-devel-0.9.6-1.2">libssh-devel-0.9.6-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh4-0.9.6-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libssh4-0.9.6-1.2">libssh4-0.9.6-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libssh4-32bit-0.9.6-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libssh4-32bit-0.9.6-1.2">libssh4-32bit-0.9.6-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.</Note>
    </Notes>
    <CVE>CVE-2018-10933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libssh-config-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh-devel-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-32bit-0.9.6-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10933.html</URL>
        <Description>CVE-2018-10933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108020</URL>
        <Description>SUSE Bug 1108020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.</Note>
    </Notes>
    <CVE>CVE-2019-14889</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libssh-config-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh-devel-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-32bit-0.9.6-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14889.html</URL>
        <Description>CVE-2019-14889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158095</URL>
        <Description>SUSE Bug 1158095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224871</URL>
        <Description>SUSE Bug 1224871</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.</Note>
    </Notes>
    <CVE>CVE-2020-16135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libssh-config-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh-devel-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-32bit-0.9.6-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-16135.html</URL>
        <Description>CVE-2020-16135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174713</URL>
        <Description>SUSE Bug 1174713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.</Note>
    </Notes>
    <CVE>CVE-2021-3634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libssh-config-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh-devel-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-0.9.6-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libssh4-32bit-0.9.6-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3634.html</URL>
        <Description>CVE-2021-3634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189608</URL>
        <Description>SUSE Bug 1189608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194948</URL>
        <Description>SUSE Bug 1194948</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
