<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2023-0155</id>
    <title>An update for openssh is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2023-03-27 08:19:42"/>
    <updated date="2023-03-27 08:19:42"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-25136" id="CVE-2023-25136" title="CVE-2023-25136 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states &quot;remote code execution is theoretically possible.&quot; (CVE-2023-25136)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="openssh">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="openssh" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-8.8p1-2.r23.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-askpass" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-askpass-8.8p1-2.r23.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-clients" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-clients-8.8p1-2.r23.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="openssh-help" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-help-8.8p1-2.r23.hce2.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-keycat" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-keycat-8.8p1-2.r23.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-server" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-server-8.8p1-2.r23.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="pam_ssh_agent_auth" version="0.10.4" release="4.2.r23.hce2">
          <filename>pam_ssh_agent_auth-0.10.4-4.2.r23.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-8.8p1-2.r23.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-askpass" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-askpass-8.8p1-2.r23.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-clients" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-clients-8.8p1-2.r23.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-keycat" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-keycat-8.8p1-2.r23.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-server" version="8.8p1" release="2.r23.hce2">
          <filename>openssh-server-8.8p1-2.r23.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="pam_ssh_agent_auth" version="0.10.4" release="4.2.r23.hce2">
          <filename>pam_ssh_agent_auth-0.10.4-4.2.r23.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
