Name | CVE-2023-25136 |
Description | OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible." |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
openssh (PTS) | bullseye (security), bullseye | 1:8.4p1-5+deb11u3 | fixed |
bookworm, bookworm (security) | 1:9.2p1-2+deb12u3 | fixed | |
sid, trixie | 1:9.9p1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
openssh | source | buster | (not affected) | |||
openssh | source | bullseye | (not affected) | |||
openssh | source | (unstable) | 1:9.2p1-1 |
[bullseye] - openssh <not-affected> (Vulnerable code not present)
[buster] - openssh <not-affected> (Vulnerable code not present)
https://www.openwall.com/lists/oss-security/2023/02/02/2
https://bugzilla.mindrot.org/show_bug.cgi?id=3522
Introduced by: https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946
https://www.openwall.com/lists/oss-security/2023/02/13/1