FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2025-01-14 21:31:10 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f1a00122-3797-11ef-b611-84a93843eb75OpenSSH -- Race condition resulting in potential remote code execution

The OpenSSH project reports:

A race condition in sshd(8) could allow remote code execution as root on non-OpenBSD systems.


Discovery 2024-07-01
Entry 2024-07-01
Modified 2024-09-20
openssh-portable
< 9.7.p1_2,1

FreeBSD
>= 14.1 lt 14.1_2

>= 14.0 lt 14.0_8

>= 13.3 lt 13.3_4

>= 13.2 lt 13.2_12

CVE-2024-6387
https://www.openssh.com/security.html
SA-24:04.openssh
887eb570-27d3-11ee-adba-c80aa9043978OpenSSH -- remote code execution via a forwarded agent socket

OpenSSH project reports:

Fix CVE-2023-38408 - a condition where specific libaries loaded via ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket if the following conditions are met: * Exploitation requires the presence of specific libraries on the victim system. * Remote exploitation requires that the agent was forwarded to an attacker-controlled system. Exploitation can also be prevented by starting ssh-agent(1) with an empty PKCS#11/FIDO allowlist (ssh-agent -P '') or by configuring an allowlist that contains only specific provider libraries. This vulnerability was discovered and demonstrated to be exploitable by the Qualys Security Advisory team.


Discovery 2023-07-19
Entry 2023-07-21
openssh-portable
openssh-portable-hpn
openssh-portable-gssapi
< 9.3.p2,1

CVE-2023-38408
https://www.openssh.com/txt/release-9.3p2