Hello Salvatore,

Salvatore Bonaccorso [2023-12-19 22:34 +0100]:
> The following vulnerability was published for libssh.
>
> CVE-2023-6004[0]:
> | ProxyCommand/ProxyJump features allow injection of malicious code
> | through hostname

I uploaded the new upstream security fix release 0.10.6 to unstable. It can
have a round of autopkgtest regression tests now.

I checked the non-CVE commits between 0.10.5 (in current stable) and 0.10.6:
https://git.libssh.org/projects/libssh.git/log/?h=stable-0.10
and IMHO they are all harmless/useful/targetted enough to be suitable for
stable-security. We did that in the last round as well [1].

However, the fix for CVE-2023-6004 caused a regression:
https://gitlab.com/libssh/libssh-mirror/-/issues/227
I will monitor this, and include the fix in the security upload once it is
available (or presumably they'll do a 0.10.7). So if it's alright with you,
I'll delay the stable-security update for a few days.

Thanks,

Martin

[1] 
https://tracker.debian.org/news/1431896/accepted-libssh-097-0deb11u1-source-into-stable-security/

Reply via email to