Bug 2224173 (CVE-2023-38408)

Summary: CVE-2023-38408 openssh: Remote code execution in ssh-agent PKCS#11 support
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bdm, chaekim, dbelyavs, fweimer, jjelen, jnoh, kyoshida, mdogra, michael.n.nhan, mvanderw, npocs, qguo, saroy, sbalasub
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the forwarded agent-socket on the server and the ability to write to the filesystem of the client host to execute arbitrary code with the privileges of the user running the ssh-agent.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-08-02 12:10:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2224179, 2224180, 2224181, 2224182, 2224183, 2224184, 2224186, 2224187, 2224188, 2224189, 2224190, 2224191    
Bug Blocks: 2224174    

Description Avinash Hanwate 2023-07-20 06:12:13 UTC
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

Comment 1 Sandipan Roy 2023-07-20 07:03:28 UTC
Created openssh tracking bugs for this issue:

Affects: fedora-all [bug 2224179]

Comment 10 errata-xmlrpc 2023-07-31 09:23:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:4329 https://access.redhat.com/errata/RHSA-2023:4329

Comment 11 errata-xmlrpc 2023-08-01 09:16:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2023:4381 https://access.redhat.com/errata/RHSA-2023:4381

Comment 12 errata-xmlrpc 2023-08-01 09:26:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:4383 https://access.redhat.com/errata/RHSA-2023:4383

Comment 13 errata-xmlrpc 2023-08-01 09:31:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:4384 https://access.redhat.com/errata/RHSA-2023:4384

Comment 14 errata-xmlrpc 2023-08-01 09:33:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:4382 https://access.redhat.com/errata/RHSA-2023:4382

Comment 15 errata-xmlrpc 2023-08-01 14:01:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:4412 https://access.redhat.com/errata/RHSA-2023:4412

Comment 16 errata-xmlrpc 2023-08-01 14:11:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:4413 https://access.redhat.com/errata/RHSA-2023:4413

Comment 17 errata-xmlrpc 2023-08-01 14:29:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4419 https://access.redhat.com/errata/RHSA-2023:4419

Comment 18 errata-xmlrpc 2023-08-02 07:56:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Extended Lifecycle Support

Via RHSA-2023:4428 https://access.redhat.com/errata/RHSA-2023:4428

Comment 19 Product Security DevOps Team 2023-08-02 12:10:05 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-38408

Comment 20 errata-xmlrpc 2023-08-30 21:20:46 UTC
This issue has been addressed in the following products:

  DEVWORKSPACE-1.0-RHEL-8

Via RHSA-2023:4889 https://access.redhat.com/errata/RHSA-2023:4889