StackPatch is liveSee product

Back to CVE digest
CVE-2023-48795 · cross-distro fix matrix

CVE-2023-48795: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connectio

Affects 4 Linux releases across 50 (distro × package) combinations.

Fix per ecosystem

Each block below is a distro release where CVE-2023-48795 has a known fix. Run the listed command on that distro to remediate.

Debian bullseye

Source: Debian Security Tracker

  • dropbear→ fixed in2020.81-3+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y dropbear
  • erlang→ fixed in1:23.2.6+dfsg-1+deb11u2urgency: not yet assigned
    sudo apt-get install --only-upgrade -y erlang
  • filezilla→ fixed in3.52.2-3+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y filezilla
  • libssh→ fixed in0.9.8-0+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y libssh
  • openssh→ fixed in1:8.4p1-5+deb11u3urgency: not yet assigned
    sudo apt-get install --only-upgrade -y openssh
  • php-phpseclib→ fixed in2.0.30-2+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y php-phpseclib
  • phpseclib→ fixed in1.0.19-3+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y phpseclib
  • proftpd-dfsg→ fixed in1.3.7a+dfsg-12+deb11u3urgency: not yet assigned
    sudo apt-get install --only-upgrade -y proftpd-dfsg
  • putty→ fixed in0.74-1+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y putty
  • python-asyncssh→ fixed in2.5.0-0.1+deb11u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y python-asyncssh

Debian bookworm

Source: Debian Security Tracker

  • dropbear→ fixed in2022.83-1+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y dropbear
  • erlang→ fixed in1:25.2.3+dfsg-1+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y erlang
  • filezilla→ fixed in3.63.0-1+deb12u3urgency: not yet assigned
    sudo apt-get install --only-upgrade -y filezilla
  • libssh→ fixed in0.10.6-0+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y libssh
  • openssh→ fixed in1:9.2p1-2+deb12u2urgency: not yet assigned
    sudo apt-get install --only-upgrade -y openssh
  • php-phpseclib→ fixed in2.0.42-1+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y php-phpseclib
  • php-phpseclib3→ fixed in3.0.19-1+deb12u2urgency: not yet assigned
    sudo apt-get install --only-upgrade -y php-phpseclib3
  • phpseclib→ fixed in1.0.20-1+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y phpseclib
  • proftpd-dfsg→ fixed in1.3.8+dfsg-4+deb12u3urgency: not yet assigned
    sudo apt-get install --only-upgrade -y proftpd-dfsg
  • proftpd-mod-proxy→ fixed in0.9.2-1+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y proftpd-mod-proxy
  • putty→ fixed in0.78-2+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y putty
  • python-asyncssh→ fixed in2.10.1-2+deb12u1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y python-asyncssh

Debian trixie

Source: Debian Security Tracker

  • dropbear→ fixed in2022.83-4urgency: not yet assigned
    sudo apt-get install --only-upgrade -y dropbear
  • erlang→ fixed in1:25.3.2.8+dfsg-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y erlang
  • filezilla→ fixed in3.66.4-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y filezilla
  • golang-go.crypto→ fixed in1:0.17.0-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y golang-go.crypto
  • libssh→ fixed in0.10.6-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y libssh
  • libssh2→ fixed in1.11.0-4urgency: not yet assigned
    sudo apt-get install --only-upgrade -y libssh2
  • openssh→ fixed in1:9.6p1-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y openssh
  • paramiko→ fixed in3.4.0-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y paramiko
  • php-phpseclib→ fixed in2.0.46-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y php-phpseclib
  • php-phpseclib3→ fixed in3.0.35-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y php-phpseclib3
  • phpseclib→ fixed in1.0.22-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y phpseclib
  • proftpd-dfsg→ fixed in1.3.8.b+dfsg-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y proftpd-dfsg
  • proftpd-mod-proxy→ fixed in0.9.3-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y proftpd-mod-proxy
  • putty→ fixed in0.80-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y putty
  • python-asyncssh→ fixed in2.15.0-1urgency: not yet assigned
    sudo apt-get install --only-upgrade -y python-asyncssh
  • tinyssh→ fixed in20230101-4urgency: unimportant
    sudo apt-get install --only-upgrade -y tinyssh

Alpine v3.20

Source: Alpine secdb

  • dropbear→ fixed in2022.83-r4
    apk update && apk add --upgrade dropbear
  • libssh2→ fixed in1.11.0-r1
    apk update && apk add --upgrade libssh2
  • openssh→ fixed in9.6_p1-r0
    apk update && apk add --upgrade openssh
  • buildah→ fixed in1.34.0-r1
    apk update && apk add --upgrade buildah
  • doctl→ fixed in1.102.0-r0
    apk update && apk add --upgrade doctl
  • erlang→ fixed in26.2.1-r0
    apk update && apk add --upgrade erlang
  • filezilla→ fixed in3.66.4-r0
    apk update && apk add --upgrade filezilla
  • gitea→ fixed in1.21.3-r0
    apk update && apk add --upgrade gitea
  • k3s→ fixed in1.29.3.1-r0
    apk update && apk add --upgrade k3s
  • libssh→ fixed in0.10.6-r0
    apk update && apk add --upgrade libssh
  • nebula→ fixed in1.8.1-r0
    apk update && apk add --upgrade nebula
  • pijul→ fixed in1.0.0_beta8-r1
    apk update && apk add --upgrade pijul
Are YOU affected by CVE-2023-48795?

5-second check on your actual server. Reads /etc/os-release, uname -r, and the distro's package manager; matches against this same cross-source index live.

curl https://mindsparkstack.com/scan.sh | bash
Continuous monitoring beats manual checking

CVE-2023-48795dropped silently in your distro's update channel. Every new CVE is the same story. StackPatch runs the matcher hourly against all 5 sources and emails the exact remediation when something new applies to one of your servers. $99 lifetime, 50 founder seats, 30-day refund.

See StackPatch ($99 lifetime)