Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:95F274DC64E190B35951CBC8522F6466
HistoryFeb 29, 2024 - 12:00 a.m.

USN-6565-1: OpenSSH vulnerabilities | Cloud Foundry

2024-02-2900:00:00
Cloud Foundry
www.cloudfoundry.org
12
openssh
canonical ubuntu
cloud foundry
vulnerabilities
escalate privileges
os command injection
cve-2021-41617
cve-2023-51385
cve-2023-51384
mitigation
upgrade
jammy stemcells
cflinuxfs4
cf deployment

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

67.4%

Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 22.04

Description

It was discovered that OpenSSH incorrectly handled supplemental groups when running helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand as a different user. An attacker could possibly use this issue to escalate privileges. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41617) It was discovered that OpenSSH incorrectly added destination constraints when PKCS#11 token keys were added to ssh-agent, contrary to expectations. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-51384) It was discovered that OpenSSH incorrectly handled user names or host names with shell metacharacters. An attacker could possibly use this issue to perform OS command injection. (CVE-2023-51385) Update Instructions: Run sudo pro fix USN-6565-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client – 1:8.2p1-4ubuntu0.11 openssh-server – 1:8.2p1-4ubuntu0.11 ssh-askpass-gnome – 1:8.2p1-4ubuntu0.11 ssh – 1:8.2p1-4ubuntu0.11 openssh-tests – 1:8.2p1-4ubuntu0.11 openssh-sftp-server – 1:8.2p1-4ubuntu0.11 No subscription required

CVEs contained in this USN include: CVE-2021-41617, CVE-2023-51385, CVE-2023-51384.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • cflinuxfs4
    • All versions prior to 1.63.0
  • Jammy Stemcells
    • 1.x versions prior to 1.340
    • All other stemcells not listed.
  • CF Deployment
    • All versions with Jammy Stemcells prior to 1.340

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below.

The Cloud Foundry project recommends upgrading the following releases:

  • cflinuxfs4
    • Upgrade all versions to 1.63.0 or greater
  • Jammy Stemcells
    • Upgrade 1.x versions to 1.340 or greater
    • All other stemcells should be upgraded to the latest version available on bosh.io.
  • CF Deployment
    • For all versions, upgrade Jammy Stemcells to 1.340 or greater

References

History

2024-02-29: Initial vulnerability report published.

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

67.4%