Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: openssh (part 2 of v9.6) #1310

Closed
dongsupark opened this issue Jan 9, 2024 · 0 comments · Fixed by flatcar/scripts#1566
Closed

update: openssh (part 2 of v9.6) #1310

dongsupark opened this issue Jan 9, 2024 · 0 comments · Fixed by flatcar/scripts#1566
Labels
advisory security advisory cvss/MEDIUM >= 4 && < 7 assessed CVSS security security concerns

Comments

@dongsupark
Copy link
Member

Name: openssh
CVEs: CVE-2023-51384, CVE-2023-51385
CVSSs: 5.5, 6.5
Action Needed: update to >= 9.6

Summary:

  • CVE-2023-51384: In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
  • CVE-2023-51385: In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.

Note: the openssh 9.6 PR was already merged, but it did not have the 2 CVEs. We just need to add the missing CVEs.

refmap.gentoo: https://bugs.gentoo.org/920722

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
advisory security advisory cvss/MEDIUM >= 4 && < 7 assessed CVSS security security concerns
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant