Regression in signal handler.

This vulnerability is exploitable remotely on glibc-based Linux systems, where syslog() itself calls async-signal-unsafe functions (for example, malloc() and free()): an unauthenticated remote code execution as root, because it affects sshd’s privileged code, which is not sandboxed and runs with full privileges.

  • refalo@programming.dev
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 days ago

    what does that mean? I don’t understand multiple signs in the same sentence and what is the significance of having “OpenSSH” in the middle?

    • cucumberbob@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 days ago

      You can read them as separate statements with the middle repeated and a logical AND between them:

      If (8.5p1 <= your OpenSSH version) AND (your OpenSSH version < 9.8p1) Then you are vulnerable

      It’s the same as saying if your OpenSSH version is between these two versions (including 8.5p1, but not 9.8p1), then you are vulnerable