Описание
Security update for openssh
This update for openssh fixes the following issue:
- CVE-2023-38408: Fixed a condition where specific libaries loaded via ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket if those libraries were present on the victim's system and if the agent was forwarded to an attacker-controlled system. [bsc#1213504, CVE-2023-38408]
Список пакетов
Image SLES15-SP2-BYOS-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-HPC-BYOS-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-BYOS-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-BYOS-GCE
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-EC2-HVM
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-GCE
openssh-8.1p1-150200.5.37.1
SUSE Enterprise Storage 7
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1
SUSE Linux Enterprise Server 15 SP2-LTSS
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1
Ссылки
- Link for SUSE-SU-2023:2946-1
- E-Mail link for SUSE-SU-2023:2946-1
- SUSE Security Ratings
- SUSE Bug 1213504
- SUSE CVE CVE-2023-38408 page
Описание
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
Затронутые продукты
Image SLES15-SP2-BYOS-Azure:openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-HPC-BYOS-Azure:openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:openssh-8.1p1-150200.5.37.1
Ссылки
- CVE-2023-38408
- SUSE Bug 1213504
- SUSE Bug 1217034
- SUSE Bug 1217035
- SUSE Bug 1218970
- SUSE Bug 1225676