Описание
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | code not present |
devel | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/focal | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
fips-preview/jammy | not-affected | code not present |
fips-updates/bionic | needs-triage | |
fips-updates/focal | not-affected | code not present |
fips-updates/jammy | not-affected | code not present |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | code not present |
devel | not-affected | code not present |
esm-apps/bionic | not-affected | code not present |
esm-apps/focal | not-affected | code not present |
esm-apps/jammy | not-affected | code not present |
esm-apps/noble | not-affected | code not present |
focal | not-affected | code not present |
jammy | not-affected | code not present |
kinetic | not-affected | code not present |
lunar | not-affected | code not present |
Показывать по
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability durin ...
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that "exploiting this vulnerability will not be easy."
EPSS
6.5 Medium
CVSS3