Skip to content

Update dependency org.apache.sshd:sshd-core to v2 [SECURITY]#23

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/maven-org.apache.sshd-sshd-core-vulnerability
Open

Update dependency org.apache.sshd:sshd-core to v2 [SECURITY]#23
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/maven-org.apache.sshd-sshd-core-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Aug 18, 2023

This PR contains the following updates:

Package Change Age Confidence
org.apache.sshd:sshd-core (source) 1.4.02.9.2 age confidence

Unsafe deserialization in Apache MINA SSHD

CVE-2022-45047 / GHSA-fhw8-8j55-vwgq

More information

Details

Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.

Until version 2.1.0, the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a commit where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.

Severity

  • CVSS Score: 9.8 / 10 (Critical)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Apache MINA SSHD information disclosure vulnerability

CVE-2023-35887 / GHSA-mjmq-gwgm-5qhm

More information

Details

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.

In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks.

This issue affects Apache MINA: from 1.0 before 2.9.3 Users are recommended to upgrade to 2.9.3

Until version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a commit where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.

Severity

  • CVSS Score: 5.0 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot force-pushed the renovate/maven-org.apache.sshd-sshd-core-vulnerability branch from 324ffbf to 2999e4a Compare August 21, 2023 15:32
@renovate renovate Bot force-pushed the renovate/maven-org.apache.sshd-sshd-core-vulnerability branch from 2999e4a to d6312a4 Compare December 7, 2023 19:14
@renovate renovate Bot changed the title Update dependency org.apache.sshd:sshd-core to v2 [SECURITY] Update dependency org.apache.sshd:sshd-core to v2 [SECURITY] - autoclosed Apr 27, 2026
@renovate renovate Bot closed this Apr 27, 2026
@renovate renovate Bot deleted the renovate/maven-org.apache.sshd-sshd-core-vulnerability branch April 27, 2026 17:44
@renovate renovate Bot changed the title Update dependency org.apache.sshd:sshd-core to v2 [SECURITY] - autoclosed Update dependency org.apache.sshd:sshd-core to v2 [SECURITY] Apr 27, 2026
@renovate renovate Bot reopened this Apr 27, 2026
@renovate renovate Bot force-pushed the renovate/maven-org.apache.sshd-sshd-core-vulnerability branch 2 times, most recently from d6312a4 to 7930f62 Compare April 27, 2026 22:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants