The maintainers of the FreeBSD Project have released security patches to rectify a critical vulnerability in OpenSSH, identified as CVE-2024-7589, which has a CVSS rating of 7.4. This flaw could potentially permit remote attackers to execute code arbitrarily with high-level privileges. A recent advisory highlighted that “a signal handler in sshd(8) might invoke a logging function that isn’t safe for asynchronous signals.” This particular signal handler is activated if a client fails to authenticate within the default LoginGraceTime, which is 120 seconds. It functions within the privileged context of sshd(8), which lacks a sandbox environment and operates with unrestricted root access. OpenSSH serves as an implementation of the SSH protocol suite, ensuring secure, encrypted, and authenticated connections for a range of services, including remote shell access. Described as “another occurrence” of an issue known as regreSSHion (CVE-2024-6387) that appeared last month, CVE-2024-7589 arises from the incorporation of blacklistd into FreeBSD’s OpenSSH. The employment of non-async-signal-safe functions within the privileged context of sshd(8) leads to a race condition that a persistent attacker might exploit, resulting in unauthenticated root-level remote code execution. It is highly recommended for FreeBSD users to upgrade to an updated version and reboot sshd to avert potential risks. Should an immediate update of sshd(8) be impractical, the race condition can be mitigated by configuring LoginGraceTime to 0 in the /etc/ssh/sshd_config file and restarting sshd(8). Although this adjustment makes the daemon vulnerable to service denial attacks, it safeguards against the execution of remote code.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...