UBUNTU-CVE-2023-25136

Source
https://ubuntu.com/security/CVE-2023-25136
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-25136.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-25136
Related
Published
2023-02-03T06:15:00Z
Modified
2024-11-20T12:28:08Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H CVSS Calculator
Summary
[none]
Details

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

References

Affected packages

Ubuntu:Pro:FIPS-updates:18.04:LTS / openssh

Package

Name
openssh
Purl
pkg:deb/ubuntu/openssh?arch=src?distro=fips-updates/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:7.*

1:7.9p1-10~ubuntu18.04.fips.0.1
1:7.9p1-10~ubuntu18.04.fips.0.2
1:7.9p1-10~ubuntu18.04.fips.0.3
1:7.9p1-10~ubuntu18.04.fips.0.4
1:7.9p1-10~ubuntu18.04.fips.0.5
1:7.9p1-10~ubuntu18.04.fips.0.6
1:7.9p1-10~ubuntu18.04.fips.0.7
1:7.9p1-10~ubuntu18.04.fips.0.8
1:7.9p1-10~ubuntu18.04.fips.0.9

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:FIPS:18.04:LTS / openssh

Package

Name
openssh
Purl
pkg:deb/ubuntu/openssh?arch=src?distro=fips/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:7.*

1:7.9p1-10~ubuntu18.04.fips.0.1
1:7.9p1-10~ubuntu18.04.fips.0.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}