SUSE-SU-2023:2940-1

Source
https://www.suse.com/support/update/announcement/2023/suse-su-20232940-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:2940-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2023:2940-1
Related
Published
2023-07-23T07:38:46Z
Modified
2023-07-23T07:38:46Z
Summary
Security update for openssh
Details

This update for openssh fixes the following issues:

  • CVE-2023-38408: Fixed a condition where specific libaries loaded via ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket if those libraries were present on the victim's system and if the agent was forwarded to an attacker-controlled system. [bsc#1213504, CVE-2023-38408]
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / openssh

Package

Name
openssh
Purl
pkg:rpm/suse/openssh&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.2p2-74.63.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "7.2p2-74.63.1",
            "openssh-fips": "7.2p2-74.63.1",
            "openssh-helpers": "7.2p2-74.63.1",
            "openssh": "7.2p2-74.63.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2-BCL / openssh-askpass-gnome

Package

Name
openssh-askpass-gnome
Purl
pkg:rpm/suse/openssh-askpass-gnome&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.2p2-74.63.1

Ecosystem specific

{
    "binaries": [
        {
            "openssh-askpass-gnome": "7.2p2-74.63.1",
            "openssh-fips": "7.2p2-74.63.1",
            "openssh-helpers": "7.2p2-74.63.1",
            "openssh": "7.2p2-74.63.1"
        }
    ]
}