Login
Newsletter
Werbung

Sicherheit: Verwendung schwacher Verschlüsselung in LXD
Aktuelle Meldungen Distributionen
Name: Verwendung schwacher Verschlüsselung in LXD
ID: USN-6738-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS (Available with Ubuntu Pro), Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Datum: Mo, 22. April 2024, 21:38
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795
Applikationen: LXD

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4987565508932594413==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------uLzWa4I0bCT0sGTRfEPtOthV"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------uLzWa4I0bCT0sGTRfEPtOthV
Content-Type: multipart/mixed;
boundary="------------yBJQcW2DCtt2bdBYgz2yN8w9";
protected-headers="v1"
From: Amir Naseredini <amir.naseredini@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <e71ab498-79a4-4b3b-a947-fb452dda9172@canonical.com>
Subject: [USN-6738-1] LXD vulnerability

--------------yBJQcW2DCtt2bdBYgz2yN8w9
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6738-1
April 22, 2024

lxd vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

LXD could be made to bypass integrity checks if it received specially crafted
input.

Software Description:
- lxd: Container hypervisor based on LXC

Details:

Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that LXD
incorrectly handled the handshake phase and the use of sequence numbers in SSH
Binary Packet Protocol (BPP). If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could possibly
use this issue to bypass integrity checks.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
lxd 3.0.3-0ubuntu1~18.04.2+esm1
lxd-client 3.0.3-0ubuntu1~18.04.2+esm1
lxd-tools 3.0.3-0ubuntu1~18.04.2+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
golang-github-lxc-lxd-dev 2.0.11-0ubuntu1~16.04.4+esm1
lxc2 2.0.11-0ubuntu1~16.04.4+esm1
lxd 2.0.11-0ubuntu1~16.04.4+esm1
lxd-client 2.0.11-0ubuntu1~16.04.4+esm1
lxd-tools 2.0.11-0ubuntu1~16.04.4+esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6738-1
CVE-2023-48795
--------------yBJQcW2DCtt2bdBYgz2yN8w9--

--------------uLzWa4I0bCT0sGTRfEPtOthV
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=SwrD
-----END PGP SIGNATURE-----

--------------uLzWa4I0bCT0sGTRfEPtOthV--


--===============4987565508932594413==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============4987565508932594413==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung