Description
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
500f
Subscribe
500f Firmware
Subscribe
A250
Subscribe
A250 Firmware
Subscribe
C250
Subscribe
C250 Firmware
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Openbsd
Subscribe
Openssh
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T11:18:35.552Z
Reserved: 2023-02-03T00:00:00.000Z
Link: CVE-2023-25136
No data.
Status : Modified
Published: 2023-02-03T06:15:09.350
Modified: 2024-11-21T07:49:10.877
Link: CVE-2023-25136
OpenCVE Enrichment
No data.