Lucene search

K
freebsdFreeBSD58750D49-7302-11EF-8C95-195D300202B3
HistoryAug 06, 2024 - 12:00 a.m.

OpenSSH -- Pre-authentication async signal safety issue

2024-08-0600:00:00
vuxml.freebsd.org
openssh
pre-authentication
signal safety
issue
freebsd
integration
async-signal-safe
logging function
root privileges

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

The FreeBSD Project reports:

    A signal handler in sshd(8) may call a logging function that is not async-
    signal-safe. The signal handler is invoked when a client does not
    authenticate within the LoginGraceTime seconds (120 by default).
    This signal handler executes in the context of the sshd(8)'s privileged
    code, which is not sandboxed and runs with full root privileges.

    This issue is another instance of the problem in CVE-2024-6387 addressed by
    FreeBSD-SA-24:04.openssh.  The faulty code in this case is from the
    integration of blacklistd in OpenSSH in FreeBSD.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopenssh-portable< 9.8.p1_1,1UNKNOWN