First published: Mon Jul 01 2024(Updated: )
A security regressionwas discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next (LTM) | >=20.1.0<=20.2.1 | |
F5 BIG-IP Next Central Manager | >=20.1.0<=20.2.1 | |
F5 BIG-IP Next | >=1.7.0<=1.9.2 | |
F5 BIG-IP Next | >=1.1.0<=1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000140222 is considered moderate due to the potential impact of a race condition in the OpenSSH server.
To fix F5-K000140222, upgrade your affected F5 products to the latest versions as specified in the advisory.
F5-K000140222 affects F5 BIG-IP Next, F5 BIG-IP Next Central Manager, F5 BIG-IP Next SPK, and F5 BIG-IP Next CNF within specified version ranges.
An attacker can exploit F5-K000140222 by failing to authenticate within the set time period, leading to a race condition in the sshd process.
Currently, the recommended action for F5-K000140222 is to apply the available patch rather than relying on workarounds.