FreeBSD OpenSSH Product Security Update Advisory (CVE-2024-7589)

Overview

 

An update has been released to address vulnerabilities in the FreeBSD OpenSSH product. Users of the affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2024-7589

  • FreeBSD 13.3-RELEASE-p5 previous version
  • FreeBSD 13.3-STABLE previous version
  • FreeBSD 14.0-RELEASE-p9 previous version
  • FreeBSD 14.1-RELEASE-p3 previous version
  • FreeBSD 14.1-STABLE previous version
     

 

Resolved Vulnerabilities

 

A signal handler in sshd(8) calls an asynchronous signal-insecure logging function, which could be exploited by an attacker to allow remote code execution with root privileges (CVE-2024-7589)
 

 

Vulnerability Patches
 

The following product-specific Vulnerability Patches were made available in the August 7, 2024 update.

For more information on Vulnerability Patches, please refer to the “V. Solution” section of the product-specific Referenced Sites documentation.

 

CVE-2024-7589

 

  • FreeBSD 13.3-RELEASE-p5 version
  • FreeBSD 13.3-STABLE version
  • FreeBSD 14.0-RELEASE-p9 version
  • FreeBSD 14.1-RELEASE-p3 version
  • FreeBSD 14.1-STABLE version

 

References

 

[1] CVE-2024-7589 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-7589

[2] OpenSSH pre-authentication async signal safety issue

https://www.freebsd.org/security/advisories/FreeBSD-SA-24:08.openssh.asc