-----BEGIN PGP SIGNATURE-----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=Umlp
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6565-1
January 03, 2024
openssh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in OpenSSH.
Software Description:
- openssh: secure shell (SSH) for secure access to remote machines
Details:
It was discovered that OpenSSH incorrectly handled supplemental groups when
running helper programs for AuthorizedKeysCommand and
AuthorizedPrincipalsCommand as a different user. An attacker could possibly
use this issue to escalate privileges. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-41617)
It was discovered that OpenSSH incorrectly added destination constraints
when PKCS#11 token keys were added to ssh-agent, contrary to expectations.
This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-51384)
It was discovered that OpenSSH incorrectly handled user names or host names
with shell metacharacters. An attacker could possibly use this issue to
perform OS command injection. (CVE-2023-51385)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
openssh-client 1:9.3p1-1ubuntu3.2
openssh-server 1:9.3p1-1ubuntu3.2
Ubuntu 23.04:
openssh-client 1:9.0p1-1ubuntu8.7
openssh-server 1:9.0p1-1ubuntu8.7
Ubuntu 22.04 LTS:
openssh-client 1:8.9p1-3ubuntu0.6
openssh-server 1:8.9p1-3ubuntu0.6
Ubuntu 20.04 LTS:
openssh-client 1:8.2p1-4ubuntu0.11
openssh-server 1:8.2p1-4ubuntu0.11
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6565-1
CVE-2021-41617, CVE-2023-51384, CVE-2023-51385
Package Information:
https://launchpad.net/ubuntu/+source/openssh/1:9.3p1-1ubuntu3.2
https://launchpad.net/ubuntu/+source/openssh/1:9.0p1-1ubuntu8.7
https://launchpad.net/ubuntu/+source/openssh/1:8.9p1-3ubuntu0.6
https://launchpad.net/ubuntu/+source/openssh/1:8.2p1-4ubuntu0.11
No comments:
Post a Comment