July 1, 2024, 3:08 p.m. |

Packet Storm packetstormsecurity.com

Debian Linux Security Advisory 5724-1 - The Qualys Threat Research Unit (TRU) discovered that OpenSSH, an implementation of the SSH protocol suite, is prone to a signal handler race condition. If a client does not authenticate within LoginGraceTime seconds (120 by default), then sshd's SIGALRM handler is called asynchronously and calls various functions that are not async-signal-safe. A remote unauthenticated attacker can take advantage of this flaw to execute arbitrary code with root privileges. This flaw affects sshd in its …

advisory authenticate called client debian debian linux security default functions implementation linux linux security openssh protocol qualys race race condition research security security advisory signal ssh sshd ssh protocol threat threat research

Principal Software Engineer

@ Mastercard | Pune, India

Sr Principal Analyst, Security Services, Emerging Technology and Trends

@ Gartner | Remote - India

Product owner B2B & CIAM

@ Philips | Best - QX

2024-2025: Information Technology – Information Security Intern

@ Chevron | Houston 1500 Louisiana Street

2024-2025: Information Technology – Information Security Intern (Previous Intern)

@ Chevron | Houston 1500 Louisiana Street

2024-2025: Information Technology – Information Security Full Time (Previous Intern)

@ Chevron | Houston 1500 Louisiana Street