Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-4413-01

Red Hat Security Advisory 2023-4413-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Issues addressed include a code execution vulnerability.

Packet Storm
#vulnerability#linux#red_hat#js#rce#ldap#auth#ssh

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: openssh security update
Advisory ID: RHSA-2023:4413-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4413
Issue date: 2023-08-01
CVE Names: CVE-2023-38408
=====================================================================

  1. Summary:

An update for openssh is now available for Red Hat Enterprise Linux 8.6
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v.8.6) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS EUS (v.8.6) - aarch64, ppc64le, s390x, x86_64

  1. Description:

OpenSSH is an SSH protocol implementation supported by a number of Linux,
UNIX, and similar operating systems. It includes the core files necessary
for both the OpenSSH client and server.

Security Fix(es):

  • openssh: Remote code execution in ssh-agent PKCS#11 support
    (CVE-2023-38408)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the OpenSSH server daemon (sshd) will be
restarted automatically.

  1. Bugs fixed (https://bugzilla.redhat.com/):

2224173 - CVE-2023-38408 openssh: Remote code execution in ssh-agent PKCS#11 support

  1. Package List:

Red Hat Enterprise Linux AppStream EUS (v.8.6):

aarch64:
openssh-askpass-8.0p1-15.el8_6.aarch64.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-debugsource-8.0p1-15.el8_6.aarch64.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.aarch64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.aarch64.rpm

ppc64le:
openssh-askpass-8.0p1-15.el8_6.ppc64le.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-debugsource-8.0p1-15.el8_6.ppc64le.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.ppc64le.rpm

s390x:
openssh-askpass-8.0p1-15.el8_6.s390x.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-debugsource-8.0p1-15.el8_6.s390x.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.s390x.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.s390x.rpm

x86_64:
openssh-askpass-8.0p1-15.el8_6.x86_64.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-debugsource-8.0p1-15.el8_6.x86_64.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.x86_64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.x86_64.rpm

Red Hat Enterprise Linux BaseOS EUS (v.8.6):

Source:
openssh-8.0p1-15.el8_6.src.rpm

aarch64:
openssh-8.0p1-15.el8_6.aarch64.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-cavs-8.0p1-15.el8_6.aarch64.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-clients-8.0p1-15.el8_6.aarch64.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-debugsource-8.0p1-15.el8_6.aarch64.rpm
openssh-keycat-8.0p1-15.el8_6.aarch64.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-ldap-8.0p1-15.el8_6.aarch64.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.aarch64.rpm
openssh-server-8.0p1-15.el8_6.aarch64.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.aarch64.rpm
pam_ssh_agent_auth-0.10.3-7.15.el8_6.aarch64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.aarch64.rpm

ppc64le:
openssh-8.0p1-15.el8_6.ppc64le.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-cavs-8.0p1-15.el8_6.ppc64le.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-clients-8.0p1-15.el8_6.ppc64le.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-debugsource-8.0p1-15.el8_6.ppc64le.rpm
openssh-keycat-8.0p1-15.el8_6.ppc64le.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-ldap-8.0p1-15.el8_6.ppc64le.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
openssh-server-8.0p1-15.el8_6.ppc64le.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.ppc64le.rpm
pam_ssh_agent_auth-0.10.3-7.15.el8_6.ppc64le.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.ppc64le.rpm

s390x:
openssh-8.0p1-15.el8_6.s390x.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-cavs-8.0p1-15.el8_6.s390x.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-clients-8.0p1-15.el8_6.s390x.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-debugsource-8.0p1-15.el8_6.s390x.rpm
openssh-keycat-8.0p1-15.el8_6.s390x.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-ldap-8.0p1-15.el8_6.s390x.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.s390x.rpm
openssh-server-8.0p1-15.el8_6.s390x.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.s390x.rpm
pam_ssh_agent_auth-0.10.3-7.15.el8_6.s390x.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.s390x.rpm

x86_64:
openssh-8.0p1-15.el8_6.x86_64.rpm
openssh-askpass-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-cavs-8.0p1-15.el8_6.x86_64.rpm
openssh-cavs-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-clients-8.0p1-15.el8_6.x86_64.rpm
openssh-clients-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-debugsource-8.0p1-15.el8_6.x86_64.rpm
openssh-keycat-8.0p1-15.el8_6.x86_64.rpm
openssh-keycat-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-ldap-8.0p1-15.el8_6.x86_64.rpm
openssh-ldap-debuginfo-8.0p1-15.el8_6.x86_64.rpm
openssh-server-8.0p1-15.el8_6.x86_64.rpm
openssh-server-debuginfo-8.0p1-15.el8_6.x86_64.rpm
pam_ssh_agent_auth-0.10.3-7.15.el8_6.x86_64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.15.el8_6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2023-38408
https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=MjE7
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

CVE-2023-48660: DSA-2023-443: Dell PowerMaxOS 5978, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM Secu

Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.

CVE-2023-30994: Security Bulletin: IBM QRadar SIEM includes components with known vulnerabilities

IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138

Red Hat Security Advisory 2023-5029-01

Red Hat Security Advisory 2023-5029-01 - An update is now available for Red Hat OpenShift GitOps 1.9. Issues addressed include a denial of service vulnerability.

RHSA-2023:4972: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.8 security updates and bug fixes

Multicluster Engine for Kubernetes 2.1.8 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37466: A flaw was found in the vm2 Promise handler sanitization, which allows attackers to esc...

Red Hat Security Advisory 2023-4889-01

Red Hat Security Advisory 2023-4889-01 - The DevWorkspace Operator extends OpenShift to provide DevWorkspace support. Issues addressed include a code execution vulnerability.

RHSA-2023:4892: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.12 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.12 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24532: A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.

RHSA-2023:4875: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.1 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.8.1 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3027: The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created polic...

CVE-2023-40371: Security Bulletin: AIX is vulnerable to unauthorized file access and arbitrary code execution due to OpenSSH (CVE-2023-40371 and CVE-2023-38408)

IBM AIX 7.2, 7.3, VIOS 3.1's OpenSSH implementation could allow a non-privileged local user to access files outside of those allowed due to improper access controls. IBM X-Force ID: 263476.

Red Hat Security Advisory 2023-4650-01

Red Hat Security Advisory 2023-4650-01 - Multicluster Engine for Kubernetes 2.2.7 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.

Red Hat Security Advisory 2023-4576-01

Red Hat Security Advisory 2023-4576-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters.

RHSA-2023:4456: Red Hat Security Advisory: OpenShift Container Platform 4.13.8 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

Red Hat Security Advisory 2023-4428-01

Red Hat Security Advisory 2023-4428-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2023-4419-01

Red Hat Security Advisory 2023-4419-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Issues addressed include a code execution vulnerability.

RHSA-2023:4428: Red Hat Security Advisory: openssh security update

An update for openssh is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-38408: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an a...

RHSA-2023:4382: Red Hat Security Advisory: openssh security update

An update for openssh is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-38408: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the...

RHSA-2023:4384: Red Hat Security Advisory: openssh security update

An update for openssh is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-38408: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarde...

RHSA-2023:4383: Red Hat Security Advisory: openssh security update

An update for openssh is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-38408: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw al...

RHSA-2023:4381: Red Hat Security Advisory: openssh security update

An update for openssh is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-38408: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an ...

RHSA-2023:4329: Red Hat Security Advisory: openssh security update

An update for openssh is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-38408: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an at...

Ubuntu Security Notice USN-6242-1

Ubuntu Security Notice 6242-1 - It was discovered that OpenSSH incorrectly handled loading certain PKCS#11 providers. If a user forwarded their ssh-agent to an untrusted system, a remote attacker could possibly use this issue to load arbitrary libraries from the user's system and execute arbitrary code.

New OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injection

Details have emerged about a now-patched flaw in OpenSSH that could be potentially exploited to run arbitrary commands remotely on compromised hosts under specific conditions. "This vulnerability allows a remote attacker to potentially execute arbitrary commands on vulnerable OpenSSH's forwarded ssh-agent," Saeed Abbasi, manager of vulnerability research at Qualys, said in an analysis last week.

CVE-2023-38408: Disallow remote addition of FIDO/PKCS11 provider libraries to · openbsd/src@7bc29a9

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

Packet Storm: Latest News

Zeek 6.0.9