Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:2946-1

Опубликовано: 24 июл. 2023
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issue:

  • CVE-2023-38408: Fixed a condition where specific libaries loaded via ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket if those libraries were present on the victim's system and if the agent was forwarded to an attacker-controlled system. [bsc#1213504, CVE-2023-38408]

Список пакетов

Image SLES15-SP2-BYOS-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-HPC-BYOS-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-BYOS-Azure
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-BYOS-GCE
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-EC2-HVM
openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-GCE
openssh-8.1p1-150200.5.37.1
SUSE Enterprise Storage 7
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1
SUSE Linux Enterprise Server 15 SP2-LTSS
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
openssh-8.1p1-150200.5.37.1
openssh-askpass-gnome-8.1p1-150200.5.37.1
openssh-fips-8.1p1-150200.5.37.1
openssh-helpers-8.1p1-150200.5.37.1

Описание

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-HPC-BYOS-Azure:openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:openssh-8.1p1-150200.5.37.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:openssh-8.1p1-150200.5.37.1

Ссылки
Уязвимость SUSE-SU-2023:2946-1