跳转到帖子

Red Hat: CVE-2023-25136: the functions order_hostkeyalgs() and list_hostkey_types() leads to double-free vulnerability (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2023-25136: the functions order_hostkeyalgs() and list_hostkey_types() leads to double-free vulnerability (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:C)
Published
02/03/2023
Created
05/15/2023
Added
05/15/2023
Modified
01/30/2025

Description

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

Solution(s)

  • redhat-upgrade-openssh
  • redhat-upgrade-openssh-askpass
  • redhat-upgrade-openssh-askpass-debuginfo
  • redhat-upgrade-openssh-clients
  • redhat-upgrade-openssh-clients-debuginfo
  • redhat-upgrade-openssh-debuginfo
  • redhat-upgrade-openssh-debugsource
  • redhat-upgrade-openssh-keycat
  • redhat-upgrade-openssh-keycat-debuginfo
  • redhat-upgrade-openssh-server
  • redhat-upgrade-openssh-server-debuginfo
  • redhat-upgrade-openssh-sk-dummy-debuginfo
  • redhat-upgrade-pam_ssh_agent_auth
  • redhat-upgrade-pam_ssh_agent_auth-debuginfo

References

  • CVE-2023-25136
  • RHSA-2023:2645
  • 查看数 694
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…