TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSH Race condition resulting in potential remote code execution

113 pointsby ggeorg11 months ago

5 comments

sebstefan11 months ago
&gt;A critical vulnerability in sshd(8) was present in Portable OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges.<p>FYI that&#x27;s every version published after 2021-03-03<p>That&#x27;s got to be 99% of all linux machines in the world with an ssh daemon running right?<p><a href="https:&#x2F;&#x2F;www.openssh.com&#x2F;releasenotes.html" rel="nofollow">https:&#x2F;&#x2F;www.openssh.com&#x2F;releasenotes.html</a>
评论 #40845359 未加载
评论 #40845371 未加载
评论 #40845356 未加载
评论 #40845658 未加载
评论 #40844801 未加载
评论 #40844901 未加载
ggeorg11 months ago
Sorry, duplicate of <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40843778">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40843778</a>
评论 #40844693 未加载
ggeorg11 months ago
<i>We discovered a vulnerability (a signal handler race condition) in OpenSSH&#x27;s server (sshd): if a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd&#x27;s SIGALRM handler is called asynchronously, but this signal handler calls various functions that are not async-signal-safe (for example, syslog()). This race condition affects sshd in its default configuration. </i><p>So SIGALRM because of the timer firing?<p>Out of curiosity... any rust sshd implementations? I found libraries, but no plug&amp;play replacement for openssh?
alberth11 months ago
&gt; Only two remote holes in the default install, in a heck of a long time!<p>As someone who doesn&#x27;t know this kind of stuff well, will this cause OpenBSD to have to update the statement above?<p><a href="https:&#x2F;&#x2F;www.openbsd.org" rel="nofollow">https:&#x2F;&#x2F;www.openbsd.org</a><p>EDIT:<p>TFA says:<p>&gt; OpenBSD is not vulnerable.
评论 #40845546 未加载
withinboredom11 months ago
We have to use this exploit to update a critical raspberry pi that nobody seems to have keys to...
评论 #40845460 未加载