Multiple Security Vulnerabilities in OpenSSH

Open SSH vulnerability

Multiple Security Vulnerabilities in OpenSSH

Product and affected versions:
OpenSSH 9.1
Severity and CEV ID:
CVE-2023-25136, pre-authentication double free vulnerability
Vulnerability:
OpenSSH server (sshd) contains a memory safety vulnerability that results in a double free in the unprivileged sshd process. The flaw occurs in the chunk of memory freed twice, the “options.kex_algorithms.”
How attack works:
Double free flaws occur when a vulnerable piece of code calls the free() function twice, leading to memory corruption that could lead to a crash or execution of arbitrary code. However, the vulnerability is not believed to be exploitable, as it occurs in the unprivileged pre-auth process that is subject to chroot(2) and is further sandboxed on most major platforms.
Remediations:
OpenSSH 9.2 has been released to address the vulnerability. Users are recommended to update to OpenSSH 9.2 to mitigate potential security threats.
https://nvd.nist.gov/vuln/detail/CVE-2023-25136
https://thehackernews.com/2023/02/openssh-patches-memory-safety-bug-in.html