CVE-2023-25136

NameCVE-2023-25136
DescriptionOpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssh (PTS)jessie, jessie (lts)1:6.7p1-5+deb8u10fixed
stretch (security)1:7.4p1-10+deb9u6fixed
stretch (lts), stretch1:7.4p1-10+deb9u9fixed
buster (security), buster, buster (lts)1:7.9p1-10+deb10u4fixed
bullseye (security), bullseye1:8.4p1-5+deb11u3fixed
bookworm (security), bookworm1:9.2p1-2+deb12u3fixed
sid, trixie1:9.9p1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensshsourcejessie(not affected)
opensshsourcestretch(not affected)
opensshsourcebuster(not affected)
opensshsourcebullseye(not affected)
opensshsource(unstable)1:9.2p1-1

Notes

[bullseye] - openssh <not-affected> (Vulnerable code not present)
[buster] - openssh <not-affected> (Vulnerable code not present)
https://www.openwall.com/lists/oss-security/2023/02/02/2
https://bugzilla.mindrot.org/show_bug.cgi?id=3522
Introduced by: https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946
https://www.openwall.com/lists/oss-security/2023/02/13/1
[stretch] - openssh <not-affected> (Vulnerable code not present)
[jessie] - openssh <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems