First published: Mon Jul 24 2023(Updated: )
It was discovered that OpenSSH incorrectly handled loading certain PKCS#11 providers. If a user forwarded their ssh-agent to an untrusted system, a remote attacker could possibly use this issue to load arbitrary libraries from the user's system and execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openssh-client | <1:9.0p1-1ubuntu8.4 | 1:9.0p1-1ubuntu8.4 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/openssh-client | <1:8.9p1-3ubuntu0.3 | 1:8.9p1-3ubuntu0.3 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/openssh-client | <1:8.2p1-4ubuntu0.8 | 1:8.2p1-4ubuntu0.8 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSH vulnerability is USN-6242-1.
The OpenSSH vulnerability allows a remote attacker to load arbitrary libraries and execute arbitrary code by exploiting the incorrect handling of loading certain PKCS#11 providers.
Ubuntu 23.04 is affected by the OpenSSH vulnerability if OpenSSH client version 1:9.0p1-1ubuntu8.4 or earlier is installed.
Ubuntu 22.04 is affected by the OpenSSH vulnerability if OpenSSH client version 1:8.9p1-3ubuntu0.3 or earlier is installed.
Ubuntu 20.04 is affected by the OpenSSH vulnerability if OpenSSH client version 1:8.2p1-4ubuntu0.8 or earlier is installed.
To fix the OpenSSH vulnerability, update the OpenSSH client package to version 1:9.0p1-1ubuntu8.4 or later for Ubuntu 23.04, version 1:8.9p1-3ubuntu0.3 or later for Ubuntu 22.04, and version 1:8.2p1-4ubuntu0.8 or later for Ubuntu 20.04.