First published: Thu Jul 20 2023(Updated: )
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2016-10009">CVE-2016-10009</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
GSI OpenSSH | <9.3p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.