Wednesday, January 3, 2024

[USN-6565-1] OpenSSH vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=Umlp
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6565-1
January 03, 2024

openssh vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in OpenSSH.

Software Description:
- openssh: secure shell (SSH) for secure access to remote machines

Details:

It was discovered that OpenSSH incorrectly handled supplemental groups when
running helper programs for AuthorizedKeysCommand and
AuthorizedPrincipalsCommand as a different user. An attacker could possibly
use this issue to escalate privileges. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-41617)

It was discovered that OpenSSH incorrectly added destination constraints
when PKCS#11 token keys were added to ssh-agent, contrary to expectations.
This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-51384)

It was discovered that OpenSSH incorrectly handled user names or host names
with shell metacharacters. An attacker could possibly use this issue to
perform OS command injection. (CVE-2023-51385)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
openssh-client 1:9.3p1-1ubuntu3.2
openssh-server 1:9.3p1-1ubuntu3.2

Ubuntu 23.04:
openssh-client 1:9.0p1-1ubuntu8.7
openssh-server 1:9.0p1-1ubuntu8.7

Ubuntu 22.04 LTS:
openssh-client 1:8.9p1-3ubuntu0.6
openssh-server 1:8.9p1-3ubuntu0.6

Ubuntu 20.04 LTS:
openssh-client 1:8.2p1-4ubuntu0.11
openssh-server 1:8.2p1-4ubuntu0.11

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6565-1
CVE-2021-41617, CVE-2023-51384, CVE-2023-51385

Package Information:
https://launchpad.net/ubuntu/+source/openssh/1:9.3p1-1ubuntu3.2
https://launchpad.net/ubuntu/+source/openssh/1:9.0p1-1ubuntu8.7
https://launchpad.net/ubuntu/+source/openssh/1:8.9p1-3ubuntu0.6
https://launchpad.net/ubuntu/+source/openssh/1:8.2p1-4ubuntu0.11

No comments:

Post a Comment