MGASA-2024-0010

Source
https://advisories.mageia.org/MGASA-2024-0010.html
Import Source
https://advisories.mageia.org/MGASA-2024-0010.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0010
Related
Published
2024-01-14T22:23:43Z
Modified
2024-01-14T22:05:19Z
Summary
Updated openssh packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities: The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (CVE-2023-38408) Prefix Truncation Attacks in SSH Specification (Terrapin Attack). (CVE-2023-48795) In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys. (CVE-2023-51384) In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name. (CVE-2023-51385)

References
Credits

Affected packages

Mageia:9 / openssh

Package

Name
openssh
Purl
pkg:rpm/mageia/openssh?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.3p1-2.1.mga9

Ecosystem specific

{
    "section": "core"
}