Debian Security Advisory 5724-1

Discussion in 'News Aggregator' started by Packet Storm, 2 Jul 2024.

  1. Packet Storm

    Packet Storm Guest

    Debian Linux Security Advisory 5724-1 - The Qualys Threat Research Unit (TRU) discovered that OpenSSH, an implementation of the SSH protocol suite, is prone to a signal handler race condition. If a client does not authenticate within LoginGraceTime seconds (120 by default), then sshd's SIGALRM handler is called asynchronously and calls various functions that are not async-signal-safe. A remote unauthenticated attacker can take advantage of this flaw to execute arbitrary code with root privileges. This flaw affects sshd in its default configuration.

    Continue reading...
     

Share This Page

Loading...